Lock down your Microsoft 365 account and keep hackers out in 5 easy steps
| | | | | | | | | | | | | | | | | | | |

Lock down your Microsoft 365 account and keep hackers out in 5 easy steps

The US government suffered a data breach after hackers targeted Microsoft Office software. Here’s how to protect your Microsoft apps and accounts. See all articles in Insights

Tech Execs: Multi-Factor Authentication Can Prevent 90% of Attacks
| | | | | | | | | | | | | | | | | | | |

Tech Execs: Multi-Factor Authentication Can Prevent 90% of Attacks

The use of multi-factor authentication (MFA) could prevent as much as 80–90% of cyber-attacks, according to figures cited by the US national security … See all articles in Insights

Reliance on third party workers making companies more vulnerable to cyberattacks – Help Net Security
| | | | | | | | | | | | | | | | | | | | |

Reliance on third party workers making companies more vulnerable to cyberattacks – Help Net Security

A survey from SecZetta revealed 83% of respondents agree that because organizations increasingly rely on contractors, freelancers, and other third … See all articles in Insights

Here’s how hackers are cracking two-factor authentication security
| | | | | | | | | | | | | | | | | | | | |

Here’s how hackers are cracking two-factor authentication security

It’s now well known that usernames and passwords aren’t enough to securely access online services. A recent study highlighted more than 80% of all hacking-related breaches happen due to compromised and weak credentials, with three billion username/password combinations stolen in 2016 alone. As such, … See all articles in Insights

How hackers can use message mirroring apps to see all your SMS texts — and bypass 2FA security
| | | | | | | | | | | | | | | | | | | | |

How hackers can use message mirroring apps to see all your SMS texts — and bypass 2FA security

It’s now well known that usernames and passwords aren’t enough to securely access online services. A recent study highlighted more than 80% of all … See all articles in Insights

How to foster collaboration with the IT team for a successful zero trust implementation – Help Net Security
| | | | | | | | | | | | | | | | | | | | |

How to foster collaboration with the IT team for a successful zero trust implementation – Help Net Security

The conversation surrounding deploying a zero trust strategy continues to gain importance following the announcement of President Biden’s recent … See all articles in Insights

How to Survive a Ransomware Attack: Five Backup Best Practices
| | | | | | | | | | | | | | | | | | | | |

How to Survive a Ransomware Attack: Five Backup Best Practices

Click to learn more about author JG Heithcock. No matter what your business or industry is, data is a critical asset to your business. Without secure … See all articles in Insights

How to ensure your vendors are cybersecure to protect you from supply chain attacks
| | | | | | | | | | | | | | | | | | | |

How to ensure your vendors are cybersecure to protect you from supply chain attacks

Right now supply-chain vendors are a prime target for cybercriminals. One expert offers ways to remove the bullseye from supply vendors. There aren’t … See all articles in Insights

Cloud Security Basics CIOs and CTOs Should Know
| | | | | | | | | | | | | | | | | | | | | |

Cloud Security Basics CIOs and CTOs Should Know

Chief information officers and chief technology officers don’t tend to be cybersecurity experts and yet they may have responsibility for it. Cloud … See all articles in Insights

Why isn’t cloud backup part of common security practices? – Help Net Security
| | | | | | | | | | | | | | | | | | | | |

Why isn’t cloud backup part of common security practices? – Help Net Security

The threat of ransomware is omnipresent, and the tactics deployed by cybercriminals are constantly evolving to wreak as much havoc as possible. … See all articles in Insights