Ryan Francis

Author Archives: Ryan Francis

Top 5 email security best practices to prevent malware distribution

A trusted channelImage by ThinkstockEmail is a critical enterprise communication tool synonymous with sending important documents quickly and efficiently between employees, managers, HR, finance, sales, legal, customers, supply chain and more. That said, organizations often don’t understand that the file types used every day to share important information – standard files like Word docs, Excel spreadsheets and PDFs – are also the most common attack vectors widely used for the distribution of malware. For cybercriminals, it’s often too easy to target a user with a spoofed email or phishing attack, and trick them into opening an infected attachment that appears to be legitimate.To read this article in full or to leave a comment, please click here

Top 5 email security best practices to prevent malware distribution

A trusted channelImage by ThinkstockEmail is a critical enterprise communication tool synonymous with sending important documents quickly and efficiently between employees, managers, HR, finance, sales, legal, customers, supply chain and more. That said, organizations often don’t understand that the file types used every day to share important information – standard files like Word docs, Excel spreadsheets and PDFs – are also the most common attack vectors widely used for the distribution of malware. For cybercriminals, it’s often too easy to target a user with a spoofed email or phishing attack, and trick them into opening an infected attachment that appears to be legitimate.To read this article in full or to leave a comment, please click here

New products of the week 4.3.17

New products of the weekImage by MicroStrategyOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.JumpStartImage by cloudjumperTo read this article in full or to leave a comment, please click here

Study finds devices are not wiped properly

As an individual, you might have an old smartphone or tablet sitting around your house collecting dust. Before recycling it, you hire a company to wipe the drive clean of any personally identifiable information. With the storage on today’s smartphones, there could be credit card information sitting in the background.You feel relieved as you pass off the device to be cleaned. A load off your shoulders, you have taken another item out of your house that was cluttering up the living room. Right? Well the device might be gone, but the data might still live on.The National Association for Information Destruction (NAID) found such in a recent study that revealed 40 percent of the devices the group bought on secondhand markets had PII on them. NAID, which is an international watchdog trade and non-profit trade association for the secure destruction industry, conducting the study in the first quarter of this year.To read this article in full or to leave a comment, please click here

Study finds devices are not wiped properly

As an individual, you might have an old smartphone or tablet sitting around your house collecting dust. Before recycling it, you hire a company to wipe the drive clean of any personally identifiable information. With the storage on today’s smartphones, there could be credit card information sitting in the background.You feel relieved as you pass off the device to be cleaned. A load off your shoulders, you have taken another item out of your house that was cluttering up the living room. Right? Well the device might be gone, but the data might still live on.The National Association for Information Destruction (NAID) found such in a recent study that revealed 40 percent of the devices the group bought on secondhand markets had PII on them. NAID, which is an international watchdog trade and non-profit trade association for the secure destruction industry, conducting the study in the first quarter of this year.To read this article in full or to leave a comment, please click here

New products of the week 3.27.17

New products of the weekImage by Array NetworksOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.NetCrunch Tools 2.0Image by adremTo read this article in full or to leave a comment, please click here

Enterprises misaligning security budget, priorities

Imagine paying for a small lock on your house every year. Burglars continue to break in despite what you think is a strong security deterrent. You spend the same amount every year on this inadequate security despite the different products on the market that promise to protect your home better.To read this article in full or to leave a comment, please click here(Insider Story)

How to stop insider threats

Watch what leaves the officeImage by ThinkstockEmployee turnover is common, as is the practice of employees taking sensitive and confidential data with them when they leave, particularly data that they were involved in generating. This creates a significant risk for employers whose data was misappropriated, resulting in potential data breaches that can trigger regulatory actions or legal actions, as well as a variety of other consequences. Most employers are not adequately prepared to deal with the aftermath of employee data theft and many do not take the steps necessary to mitigate these risks before they occur.To read this article in full or to leave a comment, please click here

How to stop insider threats

Watch what leaves the officeImage by ThinkstockEmployee turnover is common, as is the practice of employees taking sensitive and confidential data with them when they leave, particularly data that they were involved in generating. This creates a significant risk for employers whose data was misappropriated, resulting in potential data breaches that can trigger regulatory actions or legal actions, as well as a variety of other consequences. Most employers are not adequately prepared to deal with the aftermath of employee data theft and many do not take the steps necessary to mitigate these risks before they occur.To read this article in full or to leave a comment, please click here

What to consider in developing BYOD policy

Why Have a BYOD Policy?Image by ThinkstockIn today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for work. Instead of ignoring the inevitable, companies should develop and implement a BYOD policy that protects the company and balances productivity with security. Brandon N. Robinson Partner, Balch & Bingham LLP - Privacy and Data Security Practice, provides some tips.To read this article in full or to leave a comment, please click here

What to consider in developing BYOD policy

Why Have a BYOD Policy?Image by ThinkstockIn today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for work. Instead of ignoring the inevitable, companies should develop and implement a BYOD policy that protects the company and balances productivity with security. Brandon N. Robinson Partner, Balch & Bingham LLP - Privacy and Data Security Practice, provides some tips.To read this article in full or to leave a comment, please click here

How much is a bug worth?

1Password recently raised its top bug bounty reward from $25,000 to $100,000. They increased the amount to further incentivize researchers, according to its blog. Separately Google paid out $3 million last year for its vulnerability reward program.But how are these figures determined?David Baker, vice president of operations at Bugcrowd, believes these big bounties demonstrate that organizations are really starting to think about the market and where the market is pricing vulnerabilities.To read this article in full or to leave a comment, please click here

How much is a bug worth?

1Password recently raised its top bug bounty reward from $25,000 to $100,000. They increased the amount to further incentivize researchers, according to its blog. Separately Google paid out $3 million last year for its vulnerability reward program.But how are these figures determined?David Baker, vice president of operations at Bugcrowd, believes these big bounties demonstrate that organizations are really starting to think about the market and where the market is pricing vulnerabilities.To read this article in full or to leave a comment, please click here

New products of the week 3.20.17

New products of the weekImage by SolarWindsOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Asavie Industrial IoT Accelerator KitImage by asavieTo read this article in full or to leave a comment, please click here

New products of the week 3.20.17

New products of the weekImage by SolarWindsOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Asavie Industrial IoT Accelerator KitImage by asavieTo read this article in full or to leave a comment, please click here

New products of the week 3.20.17

New products of the weekImage by SolarWindsOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Asavie Industrial IoT Accelerator KitImage by asavieTo read this article in full or to leave a comment, please click here

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.This guide from Cybereason takes a closer look at nine of the often forgotten, but important steps that you should incorporate into your IR plan.Preparation across the entire companyGood security leaders should be able to get people from across the company to help develop the IR plan. While CISOs will most likely manage the team that handles the threat, dealing with the fallout from a breach requires the efforts of the entire company.To read this article in full or to leave a comment, please click here(Insider Story)

1 3 4 5 6 7 25