dcsimg

How to Change Registry Permissions with PowerShell

The Windows registry can be a goldmine for attackers and clueless employees. There’s no place better suited for introducing security vulnerabilities or completely screwing up a Windows system than the registry. … [Read more...]

Remote Work: Top 5 Challenges (and Solutions) for IT Admins

Discover the top 5 challenges facing IT admins managing remote operations, alongside the best practice solutions from Microsoft and other service providers Read the post here: Remote Work: Top 5 Challenges (and Solutions) for IT Admins … [Read more...]

Balancing Data Security and Information Sharing in Higher Education

Retaining openness and transparency while reducing cyber risk is the Holy Grail of educational IT and challenging to implement. … [Read more...]

What Is the Gramm-Leach-Bliley Act (GBLA)?

The Gramm-Leach-Bliley Act (GLBA) has been around since 1999, but it doesn't just affect financial services, it also requires higher education to comply. … [Read more...]

Security tips for working from home (WFH)

Over the last decade, remote work and working from home has grown in popularity for many professionals. In fact, a 2018 study found more than 70 percent of global employees work remotely at least once per week. However, the coronavirus pandemic and resulting lockdown in many parts of the world have forced a large number of employees into unfamiliar territory—not just remote work, but full-time … [Read more...]

The Cybersecurity Risks of Remote Employees Working From Home

The latest news and lockdowns around the world may seem drastic to some managers, but the reality is that working from home is the future for all office workers. … [Read more...]

What Is FERPA and What Are the Necessary Security Controls?

The right to privacy for individuals impacts just about every industry, and education is no different. … [Read more...]

Podcast: Managing eWaste in a Secure and Compliant Manner

Businesses must consider all the data security implications when dealing with eWaste. Many companies are now opting to shred old equipment on top of using tools to wipe storage devices. … [Read more...]

A week in security (March 2 – 8)

Last week on Malwarebytes Labs, we fired up part 1 of our series on child identity theft, asked how well law enforcement can deal with cybercriminals, and took a trip down the memory lane of moral panic. We also looked at the positives and negatives of VPNs and examined our own progress in the fight against stalkerware, spyware, and monitoring apps. Other cybersecurity news Trouble strikes for … [Read more...]

Podcast: Why Cyber Hygiene Is So Important

In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary.  … [Read more...]