Tag Archive for: Enhance

pCloud launches two free online tools to enhance security among Internet users quickly and effectively


ZUG, SWITZERLAND – Media OutReach – 2 May 2023 – In Taiwan, the need to improve online security is urgent, with organizations experiencing an average of 3,118 attacks per week last year (https://www.taiwannews.com.tw/en/news/4783488). This trend will likely worsen due to the rise in remote work and digital transformation acceleration.

Screenshot 2023-04-25 at 15.48.43.png

It is in this context that World Password Day will take place on May 4th. One of its objectives will be to raise awareness among Internet users of best practices for securing their data.

On this occasion, pCloud, the European service that offers a secure online storage solution and an encrypted password manager, launches two free online tools:

Password Checker, to easily validate the security level of each password ;
Data Breach Checker, to find out if an email is part of a hack… and it often is!

“With data breaches on the rise in 2023, we offer these free and easy-to-use tools to help build good practices that increase online security.”

Screenshot 2023-04-25 at 15.48.16.png

Check your password security quickly and effectively

The Password Strength Checker can identify how quickly a password can be cracked, with hackers usually taking just a few seconds to do so.

This is a significant concern since 78% of Generation Z use the same password for everything.

Concrete tips on creating strong passwords and avoiding the risk of being hacked are also shared by pCloud.

Find out immediately if an email is part of a data breach

pCloud’s Data Breach Checker allows users to find out instantly if their email is part of one or more known data breaches.

This is important since popular sites like Deezer, Twitter, Dropbox, and Canva have already been victims of data breaches.

Sensitive personal information associated with emails, such as credit cards, addresses, and passwords, may also have been hacked.

The problem is that people are not always aware of it, because they were not alerted when it happened or because they do not have a full picture of the scale of the phenomenon.

Accessible at any time, this tool allows the user to know instantly if their email is part of one or more known data breaches.

Here again, the Swiss company takes the opportunity to share 3 practical tips to ensure better…

Source…

How Mobile Techs Enhance EMS Response, from Dispatch to On Scene





The widespread adoption of mobile technology in EMS will transform how emergency professionals respond to 911 calls and reduce costs for EMS providers. Similar programs can help with better resource allocation, lowering costs for patients and emergency medical services overall.
The widespread adoption of mobile technology in EMS will transform how emergency professionals respond to 911 calls and reduce costs for EMS providers.
Similar programs can help with better resource allocation, lowering costs for patients and emergency medical services overall.

Guest Editorial by Scott Morris, Senior Account Manager, Panasonic Connect North America

Can you imagine a world where laptops didn’t exist for EMS workers? Yet, as late as 2011, states, including Georgia were just beginning to require that all EMS reporting be done electronically.

Besides storing all patient records in one place, mobile technology can enhance EMS response by improving communication and response times. Specific device features such as cellular and Wi-Fi connectivity help EMS workers determine the next steps for patient care, dispatch the required information to hospital networks, and deliver services more efficiently.

Mobile devices and portable laptops provide a level of flexibility not previously available for emergency services. As a first responder, the job requires workers to be on-call and ready at a moment’s notice.

First responders can now have wireless Class of Service (CoS) for mission-critical applications on the Verizon 4G LTE Private Network. (Courtesy of Verizon)
First responders need a wireless Class of Service (CoS) for mission-critical applications. (Courtesy of Verizon)

Features such as long battery life and durability ensure that first responders can be ready to go whenever a call comes in – and the device retains the power to last throughout the shift. Furthermore, having devices that allow hot-swapping provides the assurance of not losing work or connectivity while swapping in a new battery during an emergency call.

EMTs and paramedics often transition to-and-from office or desk environments to vehicles, and then to patient homes and other environments.

When it comes to their mobile devices, the emphasis for these workers now lies in blending functionality and portability with reliability and durability. Device usability should be the last thing on an EMT’s mind while they are racing to serve patients and save lives.

These devices should be able to survive drops and spills, and also be built for use outdoors, whether in extreme sunlight, rain, or snow – without screens…

Source…

BlackBerry and Samsung Partner to Enhance Protection


The pandemic-fueled increase of remote workers has caused mobile and BYOD (bring your own device) usage to soar across enterprise organizations and small businesses. Predictably, it didn’t take long for cybercriminals to cash in on the boom market in business mobility.

With approximately 5.3 billion mobile device users now roaming the planet — more than 90% relying on “smart” or internet-enabled devices — the preponderance of sparsely protected mobile assets has created a “moveable feast” for online predators.

These devices are increasingly targeted by mobile-optimized attacks, including adware, banking Trojans, malware, and remote access Trojans (RATs) – all growing in frequency, sophistication, and cost to victims.

Android Devices Are Being Targeted

Attacks against Android™ devices are happening on a significant scale. Here are some of the latest numbers:

  • 97% of organizations have contended with mobile malware threats that leverage various attack vectors.

  • Banking malware threats on Android devices increased by 80% in 2021.

  • Last year, adware accounted for 42% of new mobile malware worldwide.

  • 47% of free Android antivirus (AV) programs cannot effectively detect malware. Are BYOD employees relying on free AV programs?

  • Mobile malware apps that provide backdoors into phones are infiltrating via SMS or text messaging. Some cybercriminals are paying monthly fees of $5,000 to rent weaponized apps that let them steal access credentials and sensitive data.

Mobile threat defense (MTD) strategies help disrupt the pace and severity of malware attacks. This includes improving the overall security hygiene of your organization’s mobile users, and embracing modern mobile solutions that go beyond traditional security and enterprise mobility management (EMM).

BlackBerry and Samsung: Partnering to Provide Enhanced MTD

BlackBerry and Samsung joined forces in 2014 to provide high-security enterprise mobility management (EMM) based on BlackBerry UEM (unified endpoint management) and Samsung Knox, a proprietary security and management framework that comes pre-installed on most Samsung mobile devices. To…

Source…

Reach for control to enhance security in the cloud


Cloud-based infrastructure and services have changed the way IT practitioners design enterprise systems.

These changes offer enterprises significant security benefits and pose serious security threats.

Enterprises must take a proactive approach to reap the rewards and reduce the risk. Today, on National Computer Security Day, I’m sharing what you can do (and what you need to consider) to improve your security posture in the cloud.

Beginning with the benefits

For starters, most cloud-based SaaS offerings include an outsourced platform infrastructure. A third party often manages the service, handling operations and system maintenance. Outsourcing allows enterprises to delegate risk and take advantage of shared responsibility models. There’s some loss of configuration flexibility, but much to gain in security.

Large cloud providers have a dizzying array of security and compliance documentation, audit results, and certificates. These cover everything from the physical infrastructure facilities to their processes and technical implementations.

Software-defined networks allow enterprises to segment infrastructure without paying for physical switches and firewalls. Enterprises enjoy in-depth protection around critical resources at a fraction of the cost.

Virtualized computing and pre-packaged virtual machines allow for easy integration of security solutions and tooling for functions such as intrusion detection, application proxies, network management, and name resolution.

Platform-provided storage supports encryption at rest. It also allows fine-grained configuration of keys and permissions as appropriate for each dataset.

Adapting to a cloud-based IT world

Deploying cloud-based services challenges organizations to unlearn established security orthodoxy. Before the cloud, corporate security infrastructure protected every service by default. Enterprises assumed that each resource had its proper place in the logical network architecture. Public access to critical resources was strictly controlled. Unspooling these predispositions is hard, but it’s necessary and there are guidelines that can help.

The Centre for Internet Security lists 18 critical security controls (formerly…

Source…