System operators within an electric utility control room are responsible for balancing and maintaining the grid and reliably providing critical resources to millions of people over a wide area. Failures in the electric grid, including downtime or malfunction, could mean life or death. In the mission-critical space of control rooms, systems need to be functioning […]
Popular Tags within: IT InfrastructureCybersecurity Zoom Hybrid Work Remote Work Microphones Cisco UCC Webex Crestron data
The Senate has passed a bipartisan infrastructure bill allocating $1.9 billion towards securing critical infrastructure against attacks.
Microsoft’s August security patches include fixes for 44 vulnerabilities, including three zero days and one that is being actively exploited. The most important patches fix issues related to the Windows Print Spooler remote code execution vulnerability and the Windows LSA spoofing vulnerability and an actively exploited vulnerability in Windows Update Medic Service. Because of the […]
If you aren’t already familiar with ransomware, the increasing frequency of such attacks and the level of sophistication with which cybercriminal gangs deploy the malware, then you need to be paying more attention. The prevailing trend over the course of the last few years is the rise of double extortion, which means that the purpose […]
Cyber experts believe cyber criminal gang, DarkSide has rebranded causing what some call a giant “game of whack-a-mole.”
If you’re still requiring users to create complex passwords with a combination of letters, numbers and symbols, think again, says the U.K.’s National Cyber Security Centre. The NCSC, the U.K. counterpart to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), maintains that complexity requirements and making users regularly change passwords is actually less secure than […]
To create better learning experiences, faculty should take a student-centered perspective when it comes to students’ digital self-efficacy.
IT teams everywhere have been busy over the last year and a half helping their organization transition to remote work, and then back to a hybrid work environment as the COVID-19 pandemic began to subside earlier this year. As organizations were scrambling to adopt new technologies and solutions to accommodate those work models, cybercriminals seized, […]
Remote workers, distracted and cognitively taxed under the stresses of the pandemic may have been more likely to click on threats.
A pair of new reports from Risk Based Security find that disclosed software and hardware vulnerabilities continue to increase while reported data breaches in most parts of the world decline. For IT administrators struggling to keep pace with the rapid changes in cybersecurity, the reports provide some useful insight into exactly what you’re up against. […]