Ransomware: An Enterprise Risk for the Unprepared
| | | | | | | | | | | | | | | | | |

Ransomware: An Enterprise Risk for the Unprepared

Philip J. BezansonJason G. CohenCaroline E. EllisBrittney E. JusticeJurisdiction: All FederalClaire E. CahoonType of Law: Communications, Media & … See all articles in Insights

8 tips to empower call center teams during tough times
| | | | | | | | | | | | | | | | |

8 tips to empower call center teams during tough times

As we all ring in a fresh new year, many executives and team leaders are thinking through strategies to ensure that employees remain empowered, … See all articles in Insights

Google will shut down your free G Suite account unless you pay — what you need to know
| | | | | | | | | | | | | | | | |

Google will shut down your free G Suite account unless you pay — what you need to know

Google announced yesterday (Jan. 19) that all users of the G Suite “legacy free edition” would need to “to upgrade to a paid Google Workspace … See all articles in Insights

Microsoft Edge Could Make Zero-Day Bugs a Thing of the Past
| | | | | | | | | | | | | | | | | | |

Microsoft Edge Could Make Zero-Day Bugs a Thing of the Past

With web browsers increasingly becoming the first (and for some, perhaps the only) app most of us use, Microsoft is taking steps to harden it against … See all articles in Insights

Employee surveillance is exploding with remote work—and could be the new norm
| | | | | | | | | | | | | | | | | |

Employee surveillance is exploding with remote work—and could be the new norm

At the start of the pandemic in 2020, as office workers began toiling remotely on company laptops, many of their employers secretly followed, sending … See all articles in Insights

How to implement network segmentation for better security
| | | | | | | | | | | | | | | | | | | |

How to implement network segmentation for better security

For a network segmentation strategy to be effective and improve security, network teams need to create detailed security policies, identify each … See all articles in Insights

End Users Remain Organizations’ Biggest Security Risk
| | | | | | | | | | | | | | | | | | |

End Users Remain Organizations’ Biggest Security Risk

Yet they’re showing signs of improvement across several important areas, a Dark Reading survey reveals. See all articles in Insights

Apple’s Safari browser isn’t as secure as you think — new bug lets websites unveil your identity
| | | | | | | | | | | | | | | | | |

Apple’s Safari browser isn’t as secure as you think — new bug lets websites unveil your identity

Apple’s catchphrase for Safari, the Cupertino-based tech giant’s default browser, is “Blazing Fast. Incredibly Private.” We can’t contest the former, … See all articles in Insights

Cybersecurity labels for consumer products could be on the way
| | | | | | | | | | | | | | | | | | |

Cybersecurity labels for consumer products could be on the way

It’s a big challenge because most consumers only have a foggy understanding about which products are most secure against hacking. Even if they understood better, experts fear security would still rank far lower in buying decisions than factors like price and features. The big plan from Commerce’s … See all articles in Insights

Beware the QR code scams
| | | | | | | | | | | | | | | | | | |

Beware the QR code scams

QR code scams are growing. Here’s what to look out for. By now, most internet users know the usual scams to look out for: Phishing emails trying to steal your account logins, misspelled URLs attempting to access your bank accounts, fake online storefronts charging you for products they never intend … See all articles in Insights