dcsimg

Hidden Culprits: Protecting enterprises against physical data theft

Another day, another data breach at a major corporation – and, while a lot of these breaches are the result of malware and the activity of cybercriminals, you might be surprised to learn that stolen laptops and the loss of physical data are other key culprits. Most large enterprises are equipped with advanced security software and have IT teams dedicated to ensuring that their business data is … [Read more...]

What are SFTP Servers?

A typical file transfer server helps transfer files server-to-server or client-to-server, and SFTP servers are a more protected version: they encrypt data to keep sensitive information secure while moving files, and some have the added bonus of encrypting files at rest. SFTP servers use a single data channel in which login credentials as well as files are encrypted – because both authentication … [Read more...]

Which is Better? – AS2 vs. AS4

AS2 and AS4 are both popular file transfer protocols that allow businesses to exchange data securely with their business partners. However, what is the difference between them, and which of the two is better? Read more here Source:goanywhere.com/blog … [Read more...]

Put BIN attacks in the trash!

BIN attacks continue to be a serious problem for card issuers and merchants. Financial institutions struggle to find solutions. In Spain, police recently arrested 35 people in an international credit card fraud case, where the fraudsters used phishing, skimming, and BIN attacks to acquire card numbers. With these numbers, they made purchases and laundered money using bitcoin.   In … [Read more...]

THE VPN IS DYING, LONG LIVE ZERO TRUST

The traditional VPN is being replaced by a smarter, safer approach to network security that treats everyone as equally untrusted. The venerable VPN, which has for decades provided remote workers with a secure tunnel into the enterprise network, is facing extinction as enterprises migrate to a more agile, granular security framework called zero trust, which is better adapted to today’s world of … [Read more...]

What Is 5G Technology And How Must Businesses Prepare For It?

In some circles, there's been much talk about 5G technology and its imminent arrival. However, most individuals and companies haven't experienced it, although there's a lot of work being done behind the scenes to build, trail, and launch the infrastructure. When 5G does become widely available, we can expect immense opportunities for the technology just like we have with the launch of … [Read more...]

Email security best practices

Protect your online communication from phishing attacks and shield your business from any malicious activity. What are the risks? E-mail is now considered a key tool of every business and at the same time an opportunity to cheat on e-scammers. We could distinguish the challenges of message security into two major categories. The first one deals with email scams that target the human … [Read more...]

End of Support: Windows 7, Server 2008 & 2008 R2

Microsoft Product Support Expires On January 14, 2020, support for Windows 7, as well as Windows Server 2008 and 2008 R2 will stop «End of Season» for Windows 7 Microsoft has begun to inform Windows 7 users that security upgrades will stop on January 14, 2020.If you continue to use Windows 7 after January 14, 2020, your computer will continue to work, but it will become more vulnerable to … [Read more...]

Let’s talk Emotet malware

You may have heard about Emotet in the news. What is it: Ancient Egyptian king, your teenage sister’s favorite emo band? We’re afraid not. The Emotet banking Trojan was first identified by security researchers in 2014. Emotet was originally designed as a banking malware that attempted to sneak onto your computer and steal sensitive and private information. Later versions of … [Read more...]

GFI Software warns on impending Halloween malware

The top 10 IT security threats seen during September, says GFI, included a fraudulent online storefront promising cheap HP Touchpads; poisoned search engine results targeting users searching on Yahoo and Bing; and spam promising a US green card to would-be immigrants. According to Chris Boyd (aka Paperghost), a senior threat researcher with the security firm, over the last month, … [Read more...]