Tag Archive for: explains

Kurt "CyberGuy" Knutsson explains ransomware attacks – Fox News



Kurt “CyberGuy” Knutsson explains ransomware attacks  Fox News

Source…

Computer security expert explains Augusta's problems after cyberattack



John Shier, field chief technology officer for Sophos gives us more insight on Augusta’s cyberattack than just about anyone else has.

Source…

Jamf VP explains enterprise security threats — and how to mitigate them


Apple-focused device management and security vendor Jamf today published its Security 360: Annual Trends report, which reveals the five security tends impacting organizations running hybrid work environments. As it is every year, the report is interesting, so I spoke to Michael Covington, vice president of portfolio strategy, for more details about what the company found this year.

First, here’s a brief rundown of some of the salient points in the report:

  • In 2022, 21% of employees were using devices that were misconfigured, exposing the device and the employee to risk.
  • 31% of organizations had at least one user fall victim to a phishing attack.
  • 7% of Android devices accessed third-party app stores, which often provide versions of legitimate apps that have been tampered with to include malicious code that infects user devices, compared to 0.002% of iOS devices.
  • New malware infections dropped from just over 150 million to about 100 million, with malicious network traffic continuing to be more prevalent.

The report confirms that some of the most well-known bad security habits continue. For example, 16% of users are regularly exposing confidential or sensitive data by sharing it via unsecured Wi-Fi hotspots.

Security 360 also gives a good set of insights into how important privacy is to overall enterprise security.

The report points to a range of ways in which privacy, once broken, creates security instability, including nation states that subvert device security to watch, photograph, and record what people do in order to blackmail or otherwise exploit victims.

Another threat is poor data lifecycle management, when companies that do gather private information don’t protect that data well enough. The company continues to invest in approaches to challenge all of these. There’s a host of additional information available in the report, which you can explore here.

Source…