"If you find passwords annoying, you might not like two-factor authentication much. But security experts say it's one of the best ways to protect your online accounts.
Simply put, two-factor authentication adds a second step in your usual log-in process. Once you enter your username and password, you'll be prompted to enter a code sent as a text message or an email, or sometimes as a push notification on your phone.
In all, it usually only adds a few extra seconds to your day..."
"What if my Business is Next?
Regardless of cybersecurity proficiency, no organization is safe from data breaches. That's why it's critical that every business develops and documents an Incident Response Plan. Your response plan will outline steps your organization should take if you suspect data has been compromised. The quicker your business follows the plan, the better off you will be, and you will be in position to mitigate the impact the data loss will have on your business..."
"Because you can't hack back without breaking the law, these tactics will frustrate, deceive, and annoy intruders instead...
When you see an attacker on your network, it's understandable to want to give them a taste of their own medicine. But how can you effectively anger intruders when "hacking back" is illegal?..."
"In terms of annual storylines in cybersecurity, 2018 didn't disappoint. Industry uproar ensued after Spectre and Meltdown exposed computer chip vulnerabilities, and VPNFilter malware exposed new dangers to routers and network-attached storage products. Once again, the biggest, most trusted brands suffered costly and damaging data breaches. Victims included Amazon and Facebook, Macy's and Kmart, Adidas and Under Armour, Delta Airlines and Cathay Pacific - and that's just a start. And concerns around the cyber tampering of our elections, including allegations of foreign hacking of the Democratic National Committee, along with new international security standards that put a greater onus on global corporations (such as the General Data Protection Regulation), made 2018 a busy year for cybersecurity followers..."
"At the close of 2018, we asked CW Security Think Tank contributors to name one thing predicted for 2018 that did not happen, one thing that was not predicted but did happen, and one thing that should happen in 2019 but probably will not..."
"Here are Computer Weekly's top 10 IT security stories of 2018...
Just as WannaCry and NotPetya were the top IT security challenges of 2017, the discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018.
As enterprise teams raced to patch their systems, they faced patches that are incompatible, leading to crashes, reduced performance and lock-ups. And months after the bugs were disclosed, security experts are still divided over their significance, with some saying they opened up a dangerous new avenue of attacks, while others believe Meltdown and Spectre are not nearly as threatening as other recent bugs...."
"TREND ANALYSIS: The attacks will get worse, the attackers will become more sophisticated and that means your countermeasures must evolve quickly--or you're about to be toast.
2018 was a banner year in cybersecurity. The breaches were many, the remedies were few, and the cost of doing nothing went up. But there is hope on the horizon as new methods of authentication are beginning to show up, old practices are discarded, and as the threat landscape becomes clearer. But the risks are also going up, and failure to be ready for them could put you out of business.
Here are some key data points for business executives to know regarding IT security in 2019:..."
"If you thought passwords will soon be dead, think again. They're here to stay - for now. Passwords are cumbersome and hard to remember - and just when you did, you're told to change it again. And sometimes passwords can be guessed and are easily hackable.
Nobody likes passwords but they're a fact of life. And while some have tried to kill them off by replacing them with fingerprints and face-scanning technology, neither are perfect and many still resort back to the trusty (but frustrating) password.
How do you make them better? You need a password manager..."
See all Archived IT - Security articles
See all articles from this issue