dcsimg

3 Traits Shared by Successful CISOs

In episode 8 our popular podcast series, CISO Talks, we spoke with a specialist IT recruiter and asked what the role of CISO entails and how to be successful. First, a little clarification. The role of a CISO will vary dramatically depending on the size of the organization and the industry you are in. A CISO in the tier one investment bank, for example, may be under a lot more … Read … [Read more...]

Using Microsoft Flow to Automate Common Business Workflows

With the thousands of cloud services out there, chances are you use many of them. Whether it's using Gmail to send email, DropBox to store and access files, Google Docs to create and share docs or Slack to chat with coworkers, cloud services are incredibly prevalent today. … [Read more...]

A week in security (March 11 – 17)

Last week on Malwarebytes Labs, we looked at the Lazarus group in our series about APT groups, we discussed the introduction of Payment Service Directive 2 (PSD2) in the EU, we tackled Google’s Nest fiasco, and the launch of Mozilla’s Firefox Send. In addition, we gave you an overview of the pervasive threat, Emotet, and we discussed reputation management in the age of cyberattacks against … [Read more...]

The Ins and Outs of Security Awareness Training

One of your customers’ employees logs into their computer. They get an email from someone claiming to be their IT service provider, saying they must reset their password immediately (even though there wasn’t any warning beforehand). They click a link without checking the destination URL, go to a phishing site, and enter the credentials for their email. The criminal now has access to their email … [Read more...]

5 Tips for Prioritizing Vulnerabilities Based on Risk

In part three of our six-part blog series on improving your cybersecurity strategy, we discuss the challenges organizations face in pinpointing those vulnerabilities which pose the greatest threat to their business, and offer five tips for improving your prioritization efforts. The number of vulnerabilities has nearly doubled in the past two years. But the number of vulnerabilities being exploited … [Read more...]

Most Organizations Still Not GDPR Compliant – Here’s Why

A recent Forrester report titled “Security Through Simplicity” surveyed 481 IT security decision makers regarding their GDPR readiness. Surprisingly, according to the study, most of the organizations surveyed had not carried out fundamental steps towards GDPR compliance. A small caveat here. The December study was commissioned in August but wasn’t completed until September – well after the GDPR … [Read more...]

MOVEit 2019 is here!

A new version of MOVEit will be released on March 19th, 2019 called MOVEit 2019. The new version includes a number of enhancements designed to improve usability and provide more security and scalability options including: Live View Dynamic Links for one-click access to detailed file transfer informationGranular Secure Folder Sharing Permissions for more control over … [Read more...]

How to Get Your To-Do List Done When You’re Always in Meetings

Each morning, you emphatically write at the top of your to-do list, “Work on presentation!” Perhaps you even underline it a time or two for emphasis. But at the end of the day, your resolve has turned to dismay: yet again, you spent most of your time in meetings. And when you had a bit of time between them, you didn’t make any progress on your presentation. Read more here Source: hbr.org … [Read more...]

Why IT Won’t Let You Use Online File-Sharing Services

IT keeps schooling you about the dangers of Dropbox, Google Drive, OneDrive, and other online file-sharing services. But you still need to collaborate with your colleagues as well as your customers and business partners. … [Read more...]

Reputation management in the age of cyberattacks against businesses

Avid readers of the Malwarebytes Labs blog would know that we strive to prepare businesses of all sizes for the inevitability of cyberattacks. From effectively training employees about basic cybersecurity hygiene to guiding organizations in formulating an incident response (IR) program, a cybersecurity policy, and introducing an intentional culture of security, we aim to promote proactive … [Read more...]