IT - Security
21 Mar 2016
#50918
27% Of US Office Workers Would Sell Their Passwords
CSO Online, March 21st, 2016

"In a survey released today, 27 percent of of U.S. office workers at large companies would sell their work password to an outsider, compared to a global average of 20 percent.

And despite all the recent media attention on data breaches, password hygiene is actually deteriorating, said Juliette Rizkallah, CMO at SailPoint Technologies, which sponsored the survey..."
(Get More Information . .)

    25 Mar 2016
    #50920
    Advanced Persistent Bot Activity On The Rise
    Help Net Security, March 25th, 2016

    "Bad bots are used by fraudsters and are the key culprits behind web scraping, brute force attacks, competitive data mining, online fraud, account hijacking, data theft, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and downtime.

    In their annual report that identifies statistically significant data on global bot traffic, Distil Networks identified an influx of Advanced Persistent Bots (APBs). These can mimic human behavior, load JavaScript and external assets, tamper with cookies, perform browser automation, and spoof IP addresses and user agents..."
    (Get More Information . .)

    22 Mar 2016
    #50919
    9 Biggest Information Security Threats Through 2018 (Slideshow)
    CIO, March 22th, 2016

    "Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide a forward-looking view of the biggest security threats over a two-year period. Here are the top nine threats to watch for through 2018..."
    (Get More Information . .)

    23 Mar 2016
    #50923
    How To Manage IT Access For External Users
    ComputerWeekly, March 23rd, 2016

    "Identity and access management has extended from being solely an internal IT management process to focus on external business engagement too

    Quocirca research published in 2015 showed that all organisations now interact online with external users. To manage these relationships and provide controlled access to applications businesses need to know who the individual users are.

    Identity access management (IAM) systems have had to scale up to cope with this, and their use has been extended into lines of business. With these shifts, information stored in IAM systems now holds real business value..."
    (Get More Information . .)

    25 Mar 2016
    #50924
    People Are (Still) The Biggest Security Risks
    CIO, March 25th, 2016

    "We're battling thousands of years of evolution," says Kevin Epstein, vice president of the Threat Operations Center at Proofpoint. "It's natural to be curious about things. Unfortunately, with email scams, it's better to think before you click."

    One more reason we - the collective 'we,' that is - continue clicking on malicious links or downloading bogus attachments, despite being told not to: hackers have gotten much better at pretending to be someone they're not, using social engineering to slip past our guard by masquerading as someone else.
    (Get More Information . .)

      22 Mar 2016
      #50925
      This Bag Of Tricks May Help Stop A Locky Ransomware Infection
      Network World, March 22th, 2016

      "A malware researcher has found a few tricks to stop one of the latest types of ransomware, called Locky, from infecting a computer without using any security programs.

      Ransomware is malware that encrypts a computer's files. Users are shown instructions for how to pay a fee to get the decryption key. The costs can range from a few hundreds dollars to thousands, payable to cybercriminals in bitcoin..."
      (Get More Information . .)

      22 Mar 2016
      #50926
      Why Are Employees Shunning Security?
      Continuity Central, March 22th, 2016

      "Information security often seems to be an internal battle ground, with the organization attempting to impose ever more restrictive security and employees continually looking for ways round it to make their jobs easier and more productive. Per Stritich explains why this situation occurs and what to do about it.

      Security procedures are vital in many areas of everyday life. Across the globe, busy airports ensure crew and passengers alike go through thorough and strict security checks. This may be time-consuming and inconvenient but is absolutely necessary to ensure passenger safety and the consequences of skipping such processes have the potential to be extremely dangerous..."
      (Get More Information . .)

      25 Mar 2016
      #50921
      Banks Failing With Password Management, But Why?
      Help Net Security, March 25th, 2016

      "A recent study shows some terrifying results: banks in the U.S. often have less secure password policies in place than do social media websites. Specifically, the study found that 35 percent of the test group appear to have a significant weakness in their password policies used by their customers to access their accounts and manage their money..."
      (Get More Information . .)

        24 Mar 2016
        #50922
        Chip-And-PIN Adoption Still Slow
        CSO Online, March 24th, 2016

        "The 'chip-and-PIN' credit card system is more secure than the legacy 'swipe-and signature.' But adoption of the new system remains slow - many small merchants find the cost of upgrading more significant than the increased liability risk from fraud..."
        (Get More Information . .)

          See all archived IT - Security articles See all articles from this issue