It wasn’t that long ago we were debating the value (improved productivity; increased employee satisfaction) personal mobile devices could bring to the enterprise, beyond BlackBerry Enterprise Server. Note I say ‘could.’ Just a few short years ago, we were still discussing whether or not organizations should allow employees to rely on mobile devices for work and whether that would come via personally owned devices or a fleet of pre-approved devices owned and managed by the organization.
Google Chrome, the world’s most popular web browser, is banging another nail into Adobe Flash’s coffin… in preference for HTML5.
Microsoft released 16 bulletins for May Patch Tuesday today – 8 of which are critical. It’s a big month overall with more than 30 CVEs addressed in total. There are also two zero days included that demand your quick attention.
If your users still use Internet Explorer, make sure MS16-051 gets applied right away.
If you pay any attention to infosec headlines, you’ve likely seen it’s once again that time of year when Verizon releases its Data Breach Investigations Report (DBIR). The 9th annual report was released yesterday and while much of it isn’t surprising, it is entirely disheartening.
A quick review of the findings show cybercrime continues to target what hackers obviously deem the weakest link in the chain,
The malicious hackers developing exploit kits, designed to help online criminals break into computers systems and spread malware, are keener on exploiting Adobe Flash than any other software.
Microsoft released 13 bulletins for April Patch Tuesday today; 6 of which are rated critical. Thirty vulnerabilities have been addressed in total and the software impacted is widespread. Perhaps most importantly, there are also zero-days in the mix. To avoid compromise, IT should get these updates made quickly.
First on your list of priorities this month should be the security update for Adobe Flash.
How can SMBs protect their networks and digital assets without breaking the bank?
For all the focus on mega-enterprise security—and all the high-profile data breaches at major corporations—enterprises aren’t alone in the endpoint security battle.
Think about it for a minute. When was the last time you got through a day of e-mail without a spam e-mail with a nefarious link or attachment?
Taking an item of tremendous value – data belonging to an organization or an individual – and demanding compensation for its return is a highly effective way for criminals to get what they want. This criminal act is achieved through ransomware and, because it is effective and generally not all that complicated for a cybercriminal to carry out,
Microsoft released 13 bulletins for March Patch Tuesday today and five of them are critical. In all, we have just 39 unique vulnerabilities and thankfully, there are no zero days for IT to deal with this month. Despite the low number, quick patching remains important however, especially if your users are still on IE.
Today, we’re announcing the results of a survey recently commissioned on the state of enterprise security. Conducted by Ultimate Windows Security, the report provides visibility into the uses, concerns and challenges that IT departments face in respect to endpoint security, patching, cloud applications and mobile management.
We polled nearly 700 IT professionals working at enterprise (1,000+ employees),
Web servers around the world are at risk from a serious security vulnerability, dubbed the DROWN attack, which could allow hackers to steal private information.
Yes, you should keep your online store patched – but please be sure that the patch you are installing isn’t itself malicious.
If you thought February would be a light update month given January Patch Tuesday’s patch load of nine updates including end of support for the Windows 8 OS and all but the current version of IE, you thought wrong. Microsoft released a whopping 13 bulletins addressing 36 unique vulnerabilities in today’s February Patch Tuesday and 6 of them are considered critical.
Don’t just delete the malicious code on your web server. Determine how it got there in the first place if you want to prevent future attacks.