Continuum, the cyber security platform, announces new data revealing how managed service providers (MSPs) and their small-and medium-sized business (SMB) customers lack the tools and resources needed to sufficiently defend against rising cyberattacks and threats. The report, entitled “Under Attack: The State of MSP Cybersecurity in 2019,” found significant shortcomings in how MSPs offer cybersecurity, […]
Popular Tags within: Network SecurityCyber Security Cyber Attacks Cybersecurity Videoconferencing Zoom Education Unified Communication and Collaboration Cloud Computing Google Meet Hospitality
No, that email from Yahoo isn’t fake, and yes, the web services provider could owe you $358 or more as part of a class action settlement. According to the company, hackers obtained Yahoo account user information between 2012 and 2016, including names, email addresses, telephone numbers, birth dates, passwords, and security questions and answers of […]
CSC announces a new domain name security intelligence API that can now bring together the power of CSC’s domain name security intelligence with other cloud-based security operations platforms. “This new solution will help the world’s leading security experts, government leaders, and executives from various industries address important challenges in today’s cyber threat landscape, including the […]
FireEye, Inc. introduces new cloud security capabilities at its annual Cyber Defense Summit, including a strategic partnership with iboss, and availability on Amazon Web Services Marketplace. The FireEye Cloud Security Solution includes capabilities accessible through new cloud versions of FireEye Network Security, new Detection On Demand, a new secure web gateway offering with iboss, as […]
Higher Ed data breaches have been happening for a long time, but recently, it seems to be happening more often. One of the most recent university data breaches hit Georgia Institute of Technology (Georgia Tech), exposing up to 1.3 million individuals’ data. According to the Georgia Tech News Center, the April 2019 breach exposed information […]
The “Internet of Things,” often referred to in its abbreviated form “IoT,” is the result of the inevitable revolution of networking commonly used essential items and appliances such as refrigerators, light switches, cameras, sensors, and other forms of hardware. Even my toothbrush has network functionality via Bluetooth. The term “IoT device” typically references a class […]
What types of cyberattacks were carried out this week, October 7, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.
For the better part of the past decade, online tech support scams have been on the rise as hackers find new ways to trick consumers into providing remote access to their computers in order to steal information. This tried-and-true remote connectivity hacking scam today relies on sophisticated social engineering fueled with detailed information on the […]
If you’re running an online business, you either designed the website yourself or someone did it for you. Whichever the case, having some web design knowledge goes a long way in helping you maximize your presence on the Internet. Just like a street shop, your site’s design, content, and public-facing interface influence your visitors’ behavior. […]
What types of cyberattacks were carried out this week, September 30, 2019? Read on to find out about the latest cyberattacks and who got hacked this week.