Ian Barker

Tech workers are more likely to fall for phishing emails

Phishing

Personnel working in IT or DevOps are more likely to click on phishing emails than those in other areas of an organization.

A new study by F-Secure looks at how over 80,000 people from different organizations responded to emails that simulated one of four commonly used phishing tactics.

Continue reading

Admins struggle to keep users safe in a post-COVID world

stressed worker

A new survey of 600 IT admins finds almost a third say that their biggest challenge is keeping users secure, while 67 percent say they are stuck in a daily grind of provisioning services and apps, managing user identities, dealing with employees who have ignored best IT practices, and helping onboard new staff.

The study from Remotely also finds 28 percent say ensuring the tools remote IT teams have access to are as good or better than the ones they have on site is the problem teams struggle with the most. Following closely are: remaining as productive as they were in the office, collaboration among the sysadmin / IT admin team, and tracking their own performance.

Continue reading

Hackers continue to target zero-day vulnerabilities

Zero Day

Unpatched vulnerabilities remain the most prominent attack vectors exploited by ransomware groups, according to a new report.

The study by Ivanti, produced in conjunction with Cyber Security Works, shows 65 new vulnerabilities tied to ransomware last year, representing a 29 percent growth compared to the previous year and bringing the total number of vulnerabilities associated with ransomware to 288.

Continue reading

Over three-quarters of container images have high risk vulnerabilities

A new report from container and cloud security company Sysdig finds that 75 percent of images contain patchable vulnerabilities of 'high' or 'critical' severity. In addition 85 percent of container images that run in production contain at least one patchable vulnerability.

Looking at the issues in more detail, 73 percent of cloud accounts contain exposed S3 buckets and 36 percent of all existing S3 buckets are open to public access.

Continue reading

Moving to the edge needs a rethink of security

Edge computing

In order to provide real-time services to the user, enhance data management and support latency-critical applications, many businesses are moving computing to the edge.

But this brings with it new issues when it comes to securing systems. The latest Cybersecurity Insights Report from AT&T Cybersecurity focuses on the security considerations needed in order to implement edge computing safely.

Continue reading

Almost half of organizations don't use all of Microsoft 365's features

The thing about integrated office suites is that inevitably you don't need all of the features they provide, or at least you use some of them less than others.

New research from managed services provider Ensono shows that 83 percent of enterprises say Microsoft 365 is an invaluable part of their business operations. However, almost half aren't using all of the features available.

Continue reading

New solution helps guarantee electronic documents

Contract signing

Electronic documents are becoming more common in business, but this doesn't eliminate the risk of forgery or tampering.

UK-based Borderless Security is launching a new e-signature solution that makes use of blockchain technology to create a safe, secure and convenient solution for signing paperwork, contracts and legally binding documents.

Continue reading

What the UK's revised security guidelines mean for business [Q&A]

security meter

Changes to the UK government's Cyber Essentials security certification scheme come into force today. They include things like guidelines on remote working and hybrid approaches, rules for cloud service accounts -- such as deploying multi-factor authentication -- and speeding up critical patch deployments for critical and high severity vulnerabilities

We talked to Karl Alderton, technical account manager at security and compliance specialist Qualys to find out more about how these changes will affect businesses and what they need to do in response.

Continue reading

Security is the top concern for CIOs and budgets are increasing

Security

A new study from IDG Communications finds that more than half (57 percent) of CIOs surveyed indicate the need for security improvements as a top reason for increasing tech budgets this year.

This is followed by upgrading outdated IT infrastructure (48 percent) and investing in new skills and talent (48 percent). In addition, over three-quarters (76 percent) think their involvement with cybersecurity will increase over the next year, along with their involvement in data privacy and compliance (71 percent).

Continue reading

Insurance businesses targeted for customer details

insurance key

Insurance companies exist to offer protection but they're increasingly having to protect themselves against a range of cyberattacks.

A new report from IntSights looks at the threats faced by insurance businesses and why they’ve become a particular problem in recent times.

Continue reading

Why enterprises need to take control of their cloud costs [Q&A]

Cloud dollars

Modern businesses are more than ever reliant on using the cloud, but it's easy to develop an 'out of sight out of mind' mentality to costs when systems are not hosted on site.

We spoke to Archera CEO Aran Khanna to find out about the challenges businesses face with cloud costs and how they can keep them under control.

Continue reading

65 percent of organizations still use shared logins for infrastructure access

Password

Despite the fact that admin credentials represent a major prize for hackers and cybercriminals, a new report reveals that 65 percent of organizations still rely on shared logins and 41 percent use shared SSH keys.

The survey of 600 DevOps professionals from infrastructure access platform strongDM shows that technical staff at 93 percent of organizations have access to sensitive systems.

Continue reading

New targeted attack strategies used against industrial companies

industrial skyline

A new, rapidly evolving, series of spyware campaigns attacking more than 2,000 industrial enterprises around the world has been uncovered by experts at Kaspersky.

Although the malware used in these attacks belongs to well-known commodity spyware families, they stand out from the mainstream due to the very limited number of targets in each attack -- no more than a few dozen -- and the very short lifetime of each malicious sample.

Continue reading

UK government launches tech help scheme for small businesses

The UK government is today launching a new scheme providing small businesses with discounts of up to £5,000 on approved software as well as free advice and support through a new online platform.

Help to Grow: Digital is designed to support smaller businesses and help them to grow. It offers discounts on digital accounting and CRM software from leading suppliers.

Continue reading

Data breaches expose over 40 billion records in 2021

Data breach

New figures released today from cyber exposure company Tenable show that over 40 billion records were exposed in data breach incidents last year, a whopping 78 percent increase over the previous year.

The company's 2021 Threat Landscape Retrospective report is based on analysis of 1,825 incidents publicly disclosed between November 2020 and October 2021. Since many reports didn't include details of the number of records breached the true figure is likely to be far higher.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.