Posts Tagged ‘Network Security’
IT Compliance: What You Need to Know about GDPR Compliance
The General Data Protection Regulation (GDPR) is a regulation requiring businesses to protect the personal data and privacy of European Union (EU) citizens for transactions that occur within EU member states. Every company conducting business within the EU will need to comply to these strict new rules by May 25th which will likely cause concerns and heightened expectations for security teams due to the broad, yet stringent nature of the GDPR requirements.
Read MoreCyber Crime Cases: Infected USB Drives Distributed at Data Security Event
During a recent data security expo hosted by Taiwan’s Presidential Office, 54 malware-infested thumb drives were handed out to the public by the Criminal Investigation Bureau. These infected USB sticks were among the 250 drives the bureau gave to winners of a game about cybersecurity knowledge at their exhibit.
Read MoreAvoid A New Strain of Cloud Email Ransomware: Cloud Security Management
A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time. A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure.
Read MoreTop 25 Most Popular Passwords of 2017
Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year. Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.
Read MoreData Breaches News: Hilton Data Breach Results in Penalty
Hilton Hotels reached a settlement this month with New York Attorney General Eric T. Schneiderman and Vermont Attorney General TJ Donovan following two breaches in 2015. The settlement totaled $700,000
Read MoreAntivirus For Chrome: ESET Powers Google Virus Protection and Detection Program
Chrome Cleanup uses ESET technology to identify and eradicate suspicious or unwanted software on your Windows computer. The tool operates in the background, with no slowdowns or interruptions to the user with three easy steps.
Read More