Blog

75% MSP’s sees opportunities in working from home

According to the Managed Service Providers based on a study from Altaro, with home workers in mind, they can shift their services to that domain, whereby more devices must be secured outside the company walls. This provides a way to partially offset the losses that MSPs have suffered from the COVID-19 pandemic. Cloud computing and […]

Multifactor Authentication Password management Security

Politicans required strong password on Twitter

To protect accounts related to the US presidential election, Twitter will require a strong password for these accounts. These users are also recommended to set up two-factor authentication. The microblogging service has announced this on its own website. In this way, Twitter wants to protect so-called “high-profile accounts” during the upcoming presidential elections. These include […]

Security

CISA and FBI are actively reporting vulnerabilities in F5, Pulse Secure, Citrix, BIG-IP and Exchange

Groups of attackers are actively exploiting known vulnerabilities in F5, Pulse Secure, Citrix, Exchange and BIG-IP to attack organizations, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) of the US Department of Homeland Security said in warnings. It would be groups operating from Iran and China. The group actively searches the Internet for […]

Data Breaches Security

Amazed at what is running on your network?

A new survey by research firm Vanson Bourne of 1,350 business IT decision-makers in the US and 13 other countries sought to identify current IoT security vulnerabilities and threats in corporate organizations. One of the questions was a question that asked respondents to identify the strangest IoT devices they found connected to their organization’s networks. […]

Blog

60% of organizations see working from home threatened by cyber threats

Fortinet’s “2020 Remote Workforce Cybersecurity Report” conducted among organizations in 17 countries worldwide has some interesting conclusions after the introduction of home working:– 60% of all organizations faced an increase in the number of attack attempts. 34% reported a successful attack.– The biggest challenges surrounding the switch were secure connections, business continuity and access to […]

Security

NCSC: Mitigating malware and ransomware attacks

NCSC learns from every incident and that is brings advice to reduce the chance that organizations will become infected with ransomware and malware and limit the spread of malware within the organization and the impact of the infection. it is important to emphasize two extra measures, namely having tested, up-to-date, offline backups and disabling or […]

Uncategorized

Halo and goodbye privacy?

In August Halo was lanched by Amazon which is a new wearable device to compete with Apple Watch and Fitbit. The Halo device does not only allow customers to track things like exercise and sleep, as most fitness wearables, but can also track emotional changes by listening to the wearer’s tone of voice and can […]