A quarter of people use work emails or passwords to login to other sites


Employees working from home on a company-provided computer are putting businesses at risk with one in four consumers admitting to using their work email or password to log in to consumer websites and apps such as food delivery, online shopping and even dating apps.
A new study from automation platform Ivanti surveyed 1,000 Americans working from home during the pandemic on a company-provided computer to examine how consumer and enterprise cybersecurity habits have changed.
New breed of cybercriminal breaches organizations then sells access


Entrepreneurial cybercriminals are operating as middlemen by breaching as many companies as possible and then selling on access to the highest bidder rather than infiltrating systems themselves.
New research from Digital Shadows reveals that these 'Initial Access Brokers' are flourishing during the pandemic as employees increasingly log in to systems remotely.
Cloud misconfigurations take an average 25 days to fix


On average it takes 25 days for companies to fix cloud infrastructure misconfigurations, according to a new report from cyber resilience specialist Accurics.
The research highlights security risks identified in cloud native environments. It shows that even organizations that establish a secure baseline when infrastructure is provisioned will experience 'drift' over time, when configuration changes occur in runtime, and these take an average of eight days to fix.
Final quarter of 2020 sees massive spike in ransomware


The last quarter of 2020 saw a 10,000 percent increase in ransomware activity according to a new report from managed security services provider Nuspire.
The company's latest Year in Review Threat Landscape Report -- sourced from its 90 billion traffic logs -- outlines new cybercriminal activity and tactics, techniques and procedures.
Why enterprises aren't properly addressing supply chain threats [Q&A]


Supply chain threats like the recent SolarWinds attack are becoming more of a concern as businesses are more reliant on smoothly functioning links with suppliers and customers.
A successful attack can have a devastating effect on an organization and its reputation, but by their very nature these are not easy threats to deal with.
Executives' social media accounts put enterprises at risk


Information security often focuses on what's going on within the enterprise perimeter, but as businesses invest more in executive communication programs, there are risks which are sometimes overlooked.
According to a new survey from SafeGuard Cyber oversight of executive social media use is lacking, record-keeping is often manual, and the responsibility for risk management isn't clear.
New platform helps protect video conferencing sessions


As more work has moved online the security security issues surrounding collaboration and video conferencing applications have been thrown into the spotlight.
StrikeForce Technologies is launching a new desktop privacy protection suite called PrivacyLok, designed to address the problem by preventing unwanted applications from accessing sensitive data while protecting users from a range of threats.
60 percent of network resources expected to be at the edge by 2022


A new study from IDC and Limelight Networks predicts that by next year 60 percent of all network resources will be deployed at remote edge or service provider locations, up from just 20 percent in 2020.
The survey of 1,100 analysts worldwide shows 73 percent view edge as a strategic investment, while another 17 percent say it's required by business operations.
SolarWinds-style email compromise attacks go mainstream


The supply chain attack involving SolarWinds software last year has caused ripples throughout the cybersecurity industry, not least because it went undetected for nine months.
The attack was able to bypass traditional email security by exploiting trusted communications routes between vendors and customers. A worrying new report from Abnormal Security shows that this technique is becoming a mainstream attack vector.
Emotional intelligence becoming key to CISO roles


Greater emphasis on emotional intelligence and other skills required to work with different stakeholders is placing new demands on Chief Information Security Officers (CISOs) according to a new study.
But it's also creating opportunities for CISOs to become leaders of their organizations, according to the report from cyber security provider F-Secure, in conjunction with Omnisperience.
Three-quarters of security analysts fear missing alerts


Almost 75 percent of security analysts are worried about missing out on alerts according to a new study carried out by IDC for FireEye.
The research, which surveyed 300 IT security managers and security analysts in the US, also shows that nearly half of the alerts security analysts receive are false positives, and almost a third get ignored.
Fixing software bugs is the top developer pain point


New research from code improvement platform Rollbar finds that fixing software bugs and errors is the top pain point for 44 percent of developers.
This is not helped by inadequate tools, with a large majority (88 percent) feeling that traditional error monitoring falls short of their expectations.
Cybercriminals exploit remote working to launch targeted attacks


The pandemic-driven shift to remote working has led cybercriminals to ditch many of their old tactics, and put a new emphasis on gathering intelligence and exploiting and preying on fears with targeted and sophisticated attacks.
The latest State of Malware report from Malwarebytes has found a major shift in the devices targeted and strategies deployed by cybercriminals.
Microsoft Teams use boosted by pandemic work shift


Among the main beneficiaries of the pandemic-related shift to remote working have been suppliers of workplace collaboration and conferencing software.
New research from digital experience management platform Aternity shows that Microsoft has been a big winner with Teams usage increased nearly 3,900 percent since the beginning of pandemic.
Never send the wrong email attachment again


Many of us will at some point have attached the wrong file to an email or sent an attachment to the wrong person.
This is more than an inconvenience as it could end up exposing sensitive data. But thanks to a new feature from Tessian you may never make an attachment error again.
Ian's Bio
Ian spent almost 20 years working with computers before he discovered that writing about them was easier than fixing them. Since then he's written for a number of computer magazines and is a former editor of PC Utilities. Follow him on Mastodon
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.