IT - Security

Is someone applying for a mortgage in your name? Ruining your credit?

"The best identity theft protection and monitoring service can help you find out -- and fight back...

Your personal information is precious, and our directory of the best identity theft protection and monitoring services can help you proactively monitor suspicious activity and protect your identity as well as assist in recovering if you're a victim of a data breach that leads to identity fraud and theft. Unfortunately, you may need one of these protection services soon, if you don't already. That's because identity theft is a massive and growing problem, with more enormous data breaches hitting victims with increasing regularity..."

Lack of awareness in protecting customer's sensitive data can lead to severe repercussions

"Enterprises should be able to predict potential cybersecurity risks and invest more in building strategies against hackers.

But then, those strategies don't have to be complicated. In fact, simplifying your approach towards cybersecurity (or cybercriminals at large) can go a long way.

Not sure if you are maintaining the right cyber hygiene for your business and your customers? Here are a few tips by industry leaders that could help..."

Peer-to-peer botnets, TCP reflection attacks, and increased activity on Sundays are three DDoS attack trends from last quarter

"The number of distributed denial-of-service (DDoS) attacks nearly doubled between the fourth quarter of 2018 and fourth quarter of 2019, researchers found in a new study of DDoS trends.

Last quarter brought an increase in the number of attacks relative to the third quarter of 2019, Kaspersky Labs researchers report, and attacks also lasted longer. This was expected, they said, as the fourth quarter is often a period of "retail warfare," driving cybercrime between October and December. The end of 2018 was "very calm" and set an expectation for a 2019 increase. However, researchers did not notice a spike in DDoS activity around Black Friday or Christmas..."

In 2019 the total number of records exposed increased by 284% compared to 2018, according to Risk Based Security

2019 saw an increase in reported breaches

In total, there were over 15.1 billion records exposed shattering industry projections. There were 7,098 breaches reported in 2019, a 1% increase on 2018, though the gap is anticipated to grow throughout Q1 2020 as more 2019 incidents come to light.

'2019 was a rough year for breach activity, with reported breaches reaching an all-time high and the number of records exposed up 284% compared to 2018' commented Inga Goddijn, Executive Vice President at Risk Based Security.

Intrusion Prevention System (IPS)
SearchSecurity, February 12th, 2020
An intrusion prevention system (IPS) is a network security and threat prevention tool

"The idea behind intrusion prevention is to create a preemptive approach to network security so potential threats can be identified and responded to swiftly. Intrusion prevention systems are thereby used to examine network traffic flows in order to find malicious software and to prevent vulnerability exploits..."

Mac-Based Security Threats Outpacing Windows
ComputerWeekly, February 11th, 2020
Security threats targeting Apple endpoints are growing more quickly than those targeting Windows machines, according to Malwarebytes

"Organisations running Mac-based systems are increasingly at risk of compromise, with the volume of threats targeting the environment now growing more rapidly than those targeting Windows, according to Malwarebytes' latest annual State of malware report, which has just been released.

Over the course of 2019 - besides overarching trends such as an increased focus on targeted attacks, the resurgence of threats such as Emotet and TrickBot, and the emergence of new ransomware families such as Ryuk and Sodinokibi - Malwarebytes said it saw nearly twice as many Mac threats detected per endpoint as Windows ones..."

Password Security Best Practices In 2020
Business 2 Community, February 9th, 2020
Concerned about protecting your financial transactions and private data stored online?

"A strong password policy is your front line of defense against security threats, scammers and hackers. Implementing the best password security practices is as important at work as it is at home.

You need to understand the severity that easy-to-guess passwords bring. Also no, you cannot have the same password for twenty different accounts, only because it is easy to remember. Let's get straight to the point and go through some of the best policies that will help you create reliable, secure passwords online..."

What To Know About Open Source Security
Information Age, February 11th, 2020
Many companies have a preference towards open source technology, so what should be kept in mind in regards to ensuring its security?

"Like any area of tech, open source needs its own security measures to thrive without a hitch.

A major benefit that organisations gain from using open source tech is that it's freely available and not distributed from a particular proprietor.

The 'open source' aspect refers to the code, and can be found within databases, applications and operating systems, among other software. This code can be changed to suit the needs of the business..."

See all Archived IT - Security articles See all articles from this issue