MobileIron report warns of C-suite risk to mobile security

It is already commonly regarded that humans are the weakest link in the chain when it comes to cybersecurity - but a new MobileIron study has found that the fish rots from the head.

According to the enterprise security provider, based on interviews of 300 enterprise IT decision makers and 50 C-level executives, the C-suite is the most likely group within an organisation to ask for more relaxed mobile security protocols, in spite of being the most likely targets for...

Protecting privileged identities in a post-Covid-19 world: A guide

Bottom line: Every organisation needs to digitally reinvent their business, starting at the system level to safely sell and serve customers with minimal physical interaction.

The hard reset every business is going through creates a strong sense of urgency to increase the agility, speed, and scale of selling, as well as customer service options that protect the health of employees, customers, and partners. Customer experience needs to be the cornerstone of digital transformation,...

Remote working during the Covid-19 pandemic: Top cybersecurity tips

COVID-19 is having a relentless impact on business services and operations. Against the new backdrop of millions working remotely, the stage is clearly set for a renewed approach to cyber security. Technology changes must be coupled with clear guidance disseminated throughout your organisation, to help staff identify potentially suspicious activity and appropriately handle company  data. 

Layer your security 

One area in particular that subjects employees and the wider...

Securing remote network access for business continuity in times of crisis: A guide

With the coronavirus outbreak continuing to gather pace, many businesses around the world are having to provide remote access for all their employees, sometimes for the first time. This is being done under pressure to tight time constraints. It’s difficult for anyone to do their best work with deadlines looming, and worries and concerns about the current situation playing on their mind. IT staff are no different.

Mistakes and misconfigurations are inevitable and that will...

Why 2019 was a ‘dynamic’ year for cybersecurity – and what lies in store for 2020 and beyond

The findings of the Cybersecurity Threat Landscape Report 2019, research prepared using threat intelligence gathered from Subex’s global honeypot network now operational in 62 cities globally, have presented the global trends that have the most significant implications for enterprises, governments, citizens and other stakeholders.

The report highlights rising malware complexity and sophistication,...

Emergencies and cyberattacks: Three common scams you need to watch for

Emergencies and cyberattacks are hard enough on their own. But disasters bring out the worst in cybercriminals, and if an event can be exploited, you can be sure that a hacker is going to do so. Whether you’re dealing with a recession, flood, or pandemic, it’s important to keep an eye out for scams that take advantage of emergencies.

From infected links to PDFs containing viruses, here are three types of scams you’ll likely see during an...

Managing enterprise authentication with single sign-on: The seven key benefits

The advent of online shopping created an expectation of 24/7 corporate availability and interaction that the arrival of the smartphone only solidified. Anything is possible now, it seems, at any time of day and from any location. In this world of limitless options, organisations must be cloud-enabled and mobile-ready to remain competitive.

This is great for users but tricky for organisations to pull off....

Most organisations still think humans are better than AI in detecting cyberthreats

Almost 60 per cent of respondents polled by WhiteHat Security said they were still more confident in cyberthreat findings verified by humans over those intelligent technologies.

In its latest report, titled “AI and Human Element Security Sentiment Study”, which surveyed 102 industry professionals, WhiteHat Security found over half of the organisations use AI or machine learning in their...

Many companies still compromising mobile security to get things done: Verizon study

Four in 10 companies admit they have ‘sacrificed’ mobile security in the past year, according to the latest study from Verizon.

The report, Verizon’s third edition of its Mobile Security Index, found many companies are leaving themselves at risk through lax security plans. 43% of respondents had sacrificed mobile security over the most recent 12 months, with two thirds (66%) of...

BlackBerry threat analysis report sounds pessimistic warning for retail and automotive brands

If you are in the automotive or retail space, expect more cyber threats in the coming year – according to a new report from BlackBerry.

The company’s 2020 Threat Report, put together using insights from Cylance, the anti-malware provider acquired by BlackBerry one year ago, analysed various attack vectors of interest to bad actors, from coin-mining to ever-sophisticated ransomware...