The top three most popular intrusion methods include unsecured RDP endpoints, email phishing, and the exploitation of corporate VPN appliances. Ransomware attacks targeting the enterprise sector have been at an all-time high in the first half of 2020. RDP is regarded as the single biggest attack vector for ransomware. Remote Desktop Protocol (RDP) is currently […]
Between 55 and 70% of the home workers have positive experiences with working from home during the corona crisis. This share was stable between March and July. About 40-60% of them expect to continue working from home more often when the crisis is over. An increase has been visible here since the start of the […]
The Ministry of Justice and Security is investigating whether Google complies with the privacy rules. This is done with the help of a data protection impact assessment (DPIA). Expected completion of this DPIA is in the autumn. The wish arose from education where digitization took place at breakneck speed, not knowing whether these parties that […]
CyberNews cyber security experts hijacked nearly 28,000 unsecured printers worldwide and forced them to print a printer security manual. How to secure a printer? Limit or disable network printing; Secure your print ports; Use a firewall; Update your printer firmware to the latest version; Change the default password to a strong passphrase. Read more on […]
According to researchers at the American Ponemon Institute, cyber attacks are the leading cause of data leaks, followed by technical defects, configuration errors in the cloud and human error. The “Cost of a Data Breach Report 2020” study conducted by IBM among 3,200 people from 524 organizations shows that the average cost per leaked or […]
Details of the Ukraine Cyber Police in collaboration with cryptocurrency exchange Binance show insight into how the group operated. As per reports, they also offered money laundering services of cryptocurrencies through underground forums which are a hotspot for criminals. This led to a source of money from various illegal activities including but not limited to: […]
With the Central Government’s CopyID app, you can cross out the identity details in a copy of your identity document that organizations do not need or are not allowed to process. This can be, for example, the citizen service number (BSN), but also a passport photo or signature. This depends on the organization and purpose […]
A desk clerk had difficulty logging into the hospital information system and asked aloud “How do I log in?” To a colleague who also had a patient in front of the splash screen.Then the login code and then the password were loud and audible for everyone. In hospitals people are notoriously careless, careless and thoughtless […]
Yesterday Uber’s former security chief Joe Sullivan was charged with attempting to conceal a hack from federal investigators. This hack exposed the email addresses and phone numbers of 57 million drivers and passengers. As a result the former CISO could face up to eight years in prison for not promptly disclosing to the employee and […]
NCSC published the following Small Business Guide for Cyber Security with the following steps for which ID Control gives some free trials of cloud security services: Backing up your data; Protecting your organization from malware (f.e. https://antivirusservice.eu/ ); Keep your mobile devices safe (f.e. https://antivirusservice.eu/ ); Using password to keep your data safe (f.e. https://idcontrol.pw); Avoid phishing attacks. […]