Business security


293 articles

Business Security

Putting cybersecurity first: Why secure-by-design must be the norm

Putting cybersecurity first: Why secure-by-design must be the norm

Business Security

Putting cybersecurity first: Why secure-by-design must be the norm

Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom

Phil Muncaster26 Oct 2021


Business Security

What’s lurking in the shadows? How to manage the security risks of shadow IT

What’s lurking in the shadows? How to manage the security risks of shadow IT

Business Security

What’s lurking in the shadows? How to manage the security risks of shadow IT

Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era

Phil Muncaster22 Oct 2021


Ransomware

$5.2 billion worth of Bitcoin transactions possibly tied to ransomware

$5.2 billion worth of Bitcoin transactions possibly tied to ransomware

Ransomware

$5.2 billion worth of Bitcoin transactions possibly tied to ransomware

Threat actors are increasingly using advanced tactics to obfuscate and launder their illicit gains, a report by the US Government finds

Amer Owaida19 Oct 2021


Business Security

Employee offboarding: Why companies must close a crucial gap in their security strategy

Employee offboarding: Why companies must close a crucial gap in their security strategy

Business Security

Employee offboarding: Why companies must close a crucial gap in their security strategy

There are various ways a departing employee could put your organization at risk of a data breach. How do you offboard employees the right way and ensure your data remains safe?

Phil Muncaster14 Oct 2021


Ransomware

Ransomware cost US companies almost $21 billion in downtime in 2020

Ransomware cost US companies almost $21 billion in downtime in 2020

Ransomware

Ransomware cost US companies almost $21 billion in downtime in 2020

The victims lost an average of nine days to downtime and two-and-a-half months to investigations, an analysis of disclosed attacks shows

Amer Owaida11 Oct 2021


Threat Reports, ESET Research

ESET Threat Report T2 2021

ESET Threat Report T2 2021

Threat Reports, ESET Research

ESET Threat Report T2 2021

A view of the T2 2021 threat landscape as seen by ESET telemetry and from the perspective of ESET threat detection and research experts

Roman Kováč30 Sep 2021


Business Security

CISA and NSA release guidance for securing VPNs

CISA and NSA release guidance for securing VPNs

Business Security

CISA and NSA release guidance for securing VPNs

What your organization should consider when it comes to choosing a VPN solution and hardening it against attacks

Amer Owaida29 Sep 2021


Business Security

Plugging the holes: How to prevent corporate data leaks in the cloud

Plugging the holes: How to prevent corporate data leaks in the cloud

Business Security

Plugging the holes: How to prevent corporate data leaks in the cloud

Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.

Phil Muncaster22 Sep 2021


Ransomware, Business Security

Are you, the customer, the one paying the ransomware demand?

Are you, the customer, the one paying the ransomware demand?

Ransomware, Business Security

Are you, the customer, the one paying the ransomware demand?

Ransomware payments may have greater implications than you thought – and not just for the companies that paid up

Tony Anscombe19 Aug 2021