8 security tips for small businesses
Small businesses have the same security problems as big corporations, but not the budget or staff to match. Here are some tips to help.
Read moreSmall businesses have the same security problems as big corporations, but not the budget or staff to match. Here are some tips to help.
Read moreCategories: News Tags: week in security Tags: awis Tags: typosquatting Tags: cyberstalking Tags: Snapchat Tags: student loan relief scam Tags: Gas Tags: LAPSUS$ Tags: Microsoft Tags: Ducktail Tags: Venus Tags: ransomware Tags: BYOD Tags: SMB security tips Tags: Log4Text Tags: DeadBolt Tags: spot a scam Tags: FaceStealer Tags: fake tractor fraud Tags: ThermoSecure The most important and interesting computer security stories from the last week. |
The post A week in security (October 17 – 23) appeared first on Malwarebytes Labs.
Read moreCredit to Author: Pieter Arntz| Date: Wed, 04 May 2022 16:00:00 +0000
Small businesses have the same security problems as big ones, but not the matching budget or staff. Here are some tips that can help you decide what is important for yours.
The post 8 security tips for small businesses appeared first on Malwarebytes Labs.
Read moreCredit to Author: Nikolay Pankov| Date: Fri, 13 Mar 2020 08:00:35 +0000
What to consider when instructing employees to work from home.
Read moreCredit to Author: Pieter Arntz| Date: Tue, 28 Jan 2020 16:00:00 +0000
Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses. Categories: Tags: byodcloudframeworkidentity managementinsider threatsIoTlateral threat movementmfaperimeterrdpsecuritysecurity orchestrationstrategyzero trustzero trust modelzero trust security model |
The post Explained: the strengths and weaknesses of the Zero Trust model appeared first on Malwarebytes Labs.
Read moreCredit to Author: David Ruiz| Date: Wed, 04 Sep 2019 14:06:26 +0000
Modern businesses require modern cybersecurity, and modern cybersecurity means more than just implementing the latest tech. It also means implementing good governance. Categories: Tags: 2faapproved device listbring your own devicebyodencryptionFind my iPhoneFind my MobilegovernanceIDG Connectjailbreakman-in-the-middleman-in-the-middle attackmulti-factor authenticationpasscodepasswordpublic Wi-FiRBACremoteremote employeesremote wipingremote workforcerole-based access controlsingle sign-onssotwo-factor authenticationvpn |
The post 5 simple steps to securing your remote employees appeared first on Malwarebytes Labs.
Read moreCredit to Author: Leonid Grustniy| Date: Mon, 29 Jul 2019 13:58:45 +0000
Why personal mobile devices used for work need to be secure.
Read moreCredit to Author: Pieter Arntz| Date: Mon, 01 Apr 2019 15:00:00 +0000
Water management is an essential part of our infrastructure. Loss of it can lead to service outages, diseases, and famine. So the cybersecurity should be top notch. Categories: Tags: awwabyodcity of atlantacrashoverrideemotetinsider threatsransomwarescadastuxnetvital infrastructurewater managementwater plants |
The post Compromising vital infrastructure: water management appeared first on Malwarebytes Labs.
Read more