Unlike milk, passwords don’t need an expiration date. That’s the conclusion of Microsoft, which recently announced that it will no longer attach expiration dates as part of its security requirements.
While cybersecurity remains a burning issue for organizations in 2019, many businesses and nonprofits don’t plan on or budget for a cybersecurity risk assessment. However, once organizations understand the value of their data and reputation, assessments often become a regular component of their tech management strategies.
Employees accessing company data with a multitude of devices present the largest security threat for organizations today, according to a new report from BetterCloud, an independent software vendor based in New York, NY. So how can your organization mitigate the risk from well-meaning employees? Here are a few of the most crucial steps you can take today to protect your data.
Sophisticated phone phishing scams are on the rise and agencies are urging people to be aware of telephone scams from callers posing as Internal Revenue Service agents. Learn more about how these complex phone phishing scams work, how to recognize and report them.
Data Privacy Day, held this year on Monday, January 28, is the perfect opportunity to take stock in your organization’s data privacy and security policies. There are several ways to create a culture of data security within your organization, even with a modest security budget. Here, you will find a list of data security priorities that most organizations can easily adopt with a little time, good internal communication, and without a large investment.
Extortion scammers have found a new hook to bait Internet users: old passwords. A new wave of messages that began popping up in mid-July has stepped up the ploy by showing passwords in the subject headers as attention-grabbing ‘proof’ that someone has deeply burrowed into your computer and has your personal information.
A handwriting-recognition feature in Windows collects data and stores it, which could represent a security threat, according to digital forensics experts. Passwords and emails could be among the data stored. One of the first lines of defense remains strong passwords, as well as where you store them.
Ransomware may not claim as many victims as in the past, but earlier this year, the city of Atlanta discovered its potency. Ransomware – a computer attack that holds information hostage — can cause tremendous havoc.
Microsoft Office users may find an unpleasant surprise lurking in the form of an infected, remotely embedded Adobe Flash Player bug. Recently Microsoft announced it would block future content that is embedded with Adobe Flash, Shockwave, and even their own Silverlight platform from Office 365 by January 2019. Microsoft cited that malware authors have been exploiting systems through Word, Excel, and PowerPoint files with embedded content.
Provisioning Profiles are unwanted inboxes, profiles and apps appearing in iOS devices and to date, users are having difficulty deleting these unwanted items on their phones. Concerned that this was some sort of malware, we did a bit of research to learn more about these embedded provisioning profiles. This article outlines what we discovered.
Facebook, Twitter, LinkedIn, Microsoft, Strava and Soundcloud are among the major online companies that announced plans to update their terms and conditions to comply with a new privacy law out of the European Union (EU). How will the new regulations work?
Whether your city regulates e-waste or not, there are several reasons your organization should recycle your technology. Sensitive data, whether on a laptop, server or smartphone, needs to be completely erased before you resell or recycle your technology. Having a plan for recycling your technology that includes properly disposing of electronics is not only better for the environment, but it can also mitigate the risk of having sensitive data fall into the wrong hands.
When cybercriminals call, they employ an arsenal of tricks and tactics. Now that it’s tax season, Forbes warns that scammers will try to take advantage of tax filers using spoofing and other means to obtain valuable personal data. Hanging up is the safest remedy, but there are other ways to avoid phone scams.
Facebook Messenger has become the latest minefield for unwary computer users, thanks to a new variety of malware that has immerged over the past few months. Even the latest anti-malware and patches cannot prevent every attack. However, there are steps we can all take that can minimize the risk.
In the digital world, there is no one, trusted source to verify who we are, so we fill in the same information at dozens of different sites. Each different site that gathers and verifies our info does it in a silo. The process is closed and complex with each site checking a directory of information and making a decision about whether we are who we say we are.
So, what should we while we wait for technology and policies around digital identity to catch up?
Consumers and businesses alike are choosing the convenience and efficiencies of being connected over the security of being "off the grid" (so to speak), and there are no signs of it slowing down. And, right now, the policies for securing these devices is in its infancy, increasing the risk for attacks.
Sinu has developed two documents to help your organization select the right backup solution by providing information about online backup services and what you can expect from two different types of solutions. Sinu selects backup, continuity and disaster recovery solutions based on the same criteria. We look for cloud-first solutions which are built to be future-proof as software advances.
Here at Sinu, we try to provide the latest tech news, predict trends, and share best practices – especially when it comes to protecting your data and other tech assets. Well, here is where taking our own advice paid off...
In less than 3 years, Adobe's once popular plug-in will no longer be welcomed on the web. So, what really happened to Flash? I would say it goes well beyond security issues and is more about the shift in the way we want to receive information from and interact with our devices.
One of the biggest vulnerabilities in endpoint security exists with mobile devices such as laptops, phones, and tablets. So, what can you do to mitigate the risk? Develop a mobile device or BYOD policy designed to protect your organization’s technology infrastructure and sensitive data. Here are 10 considerations: