One in 2 Companies Unable to Cope with Remote Work Security Risks

One in 2 Companies Unable to Cope with Remote Work Security Risks

by Filip Truta, from Business Insights , on 10.07.2020

Half of infosec professionals in a recent Bitdefender study revealed that their organization doesn’t have a contingency plan in place, or didn’t know if they did, for a situation like COVID-19 or a similar scenario. read more

The Key Reason Why Some Enterprises Outright Refuse to Enable BYOD

The Key Reason Why Some Enterprises Outright Refuse to Enable BYOD

by Filip Truta, from Business Insights , on 09.07.2020

Most IT professionals say employees are allowed to use personal devices for work. And while the use of personal devices at work is growing rapidly, many are unprepared to balance productivity with security, new data shows. read more

US Secret Service Warns of Attacks on MSPs

US Secret Service Warns of Attacks on MSPs

by Silviu Stahie, from Business Insights , on 08.07.2020

The United States Secret Service issued an advisory warning of an increase in cyberattacks against managed service providers (MSP) in an effort to compromise companies using their services. read more

Businesses Now Spend a Third of Their Cybersecurity Budget on SOC

Businesses Now Spend a Third of Their Cybersecurity Budget on SOC

by Filip Truta, from Business Insights , on 07.07.2020

Organizations with a dedicated security operations center (SOC) know how much it helps combating cyber threats. 72% of IT security practitioners in organizations with a SOC categorize the unit as “essential” or “very important” to their organization’s cybersecurity strategy. However, 60% of SOC team members are considering changing careers or quitting due to stress. read more

Many CIOs Believe Expired TLS Certificates Could Affect Their Business

Many CIOs Believe Expired TLS Certificates Could Affect Their Business

by Silviu Stahie, from Business Insights , on 06.07.2020

Most Chief Information Officers (CIO) are worried about the security risks associated with the proliferation of TLS machine identities, which is aggravated by the fact that many of them don’t have an accurate account of the number of certificates deployed in their infrastructure. read more

Are Companies Ready for the Risks of IoT?

Are Companies Ready for the Risks of IoT?

by Business Insights , on 04.07.2020

The Internet of Things (IoT) and Industrial IoT (IIoT) are beginning to see some real momentum, particularly in industries such as manufacturing, healthcare, and retail. More and more devices, equipment, vehicles, buildings, and other objects are being equipped with sensors and connected, enabling the sharing of data that provides useful insights for businesses. read more

Why Vulnerable IoT Is a Double-Sided Problem for ISPs and Their Customers

Why Vulnerable IoT Is a Double-Sided Problem for ISPs and Their Customers

by Silviu Stahie, from Business Insights , on 03.07.2020

A scan of the Japanese Internet infrastructure showed how many devices could be compromised with common user names and passwords, and ISPs helped the authorities make that determination. But ISPs also seemed to lack the tools to make those determinations by themselves, in a way that secures their networks and customers at the same time. read more

Chinese Tracking Platform Used in Cheap Smartwatches Found Completely Open

Chinese Tracking Platform Used in Cheap Smartwatches Found Completely Open

by Silviu STAHIE, from IoT Security Insights , on 10.07.2020

Security researchers found a vulnerability within a system called SETracker used in smartwatches, often by older people and kids, allowing attackers to take control and potentially abuse applications. IoT devices can be used in numerous ways to improve the lives of people in a meaningful way. We do have some superfluous features sometimes, but some ... The post Chinese Tracking Platform Used in Cheap Smartwatches Found Completely Open appeared first on Bitdefender. read more

Attackers Can Use Security Camera Traffic Patterns to Tell If You’re Home

Attackers Can Use Security Camera Traffic Patterns to Tell If You’re Home

by Silviu STAHIE, from IoT Security Insights , on 09.07.2020

IP security cameras could let attackers determine if anyone’s home without having to actually intercept the data stream, according to a research paper published at the IEEE International Conference on Computer Communications. Hackers can sometimes access security cameras, usually by leveraging vulnerabilities. It’s a complicated process, and it usually requires a high degree of technical ... The post Attackers Can Use Security Camera Traffic Patterns to Tell If You’re Home appeared first on Bitdefender. read more

Is Your Malware Detection Future-Proof? 7 Adaptable Technologies for Elusive Threats