The danger within: 5 steps you can take to combat insider threats
Some threats may be closer than you think. Are security risks that originate from your own trusted employees on your radar? The post The danger within: 5 steps you can take to combat insider threats appeared first on WeLiveSecurity
Verizon 2023 DBIR: What’s new this year and top takeaways for SMBs
Here are some of the key insights on the evolving data breach landscape as revealed by Verizon’s analysis of more than 16,000 incidents The post Verizon 2023 DBIR: What’s new this year and top takeaways for SMBs appeared first on WeLiveSecurity
Avoid juice jacking and recharge your batteries safely this summer
Cybercriminals can use USB charging stations in airports, hotels, malls or other public spaces as conduits for malware The post Avoid juice jacking and recharge your batteries safely this summer appeared first on WeLiveSecurity
Passwords out, passkeys in: are you ready to make the switch?
With passkeys poised for prime time, passwords seem passé. What are the main benefits of ditching one in favor of the other? The post Passwords out, passkeys in: are you ready to make the switch? appeared first on WeLiveSecurity
Cyber insurance: What is it and does my company need it?
While not a 'get out of jail free card' for your business, cyber insurance can help insulate it from the financial impact of a cyber-incident The post Cyber insurance: What is it and does my company need it? appeared first on WeLiveSecurity
Digital security for the self‑employed: Staying safe without an IT team to help
Nobody wants to spend their time dealing with the fallout of a security incident instead of building up their business The post Digital security for the self‑employed: Staying safe without an IT team to help appeared first on WeLiveSecurity
5 useful search engines for internet‑connected devices and services
A roundup of some of the handiest tools that security professionals can use to search for and monitor devices that are accessible from the internet The post 5 useful search engines for internet‑connected devices and services appeared first on WeLiveSecurity
Meet “AI”, your new colleague: could it expose your company’s secrets?
Before rushing to embrace the LLM-powered hire, make sure your organization has safeguards in place to avoid putting its business and customer data at risk The post Meet “AI”, your new colleague: could it expose your company’s secrets? appeared first on WeLiveSecurity
You may not care where you download software from, but malware does
Why do people still download files from sketchy places and get compromised as a result? The post You may not care where you download software from, but malware does appeared first on WeLiveSecurity
Creating strong, yet user‑friendly passwords: Tips for your business password policy
Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization The post Creating strong, yet user‑friendly passwords: Tips for your business password policy appeared first on WeLiveSecurity