Security

CISA and FBI are actively reporting vulnerabilities in F5, Pulse Secure, Citrix, BIG-IP and Exchange

Groups of attackers are actively exploiting known vulnerabilities in F5, Pulse Secure, Citrix, Exchange and BIG-IP to attack organizations, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) of the US Department of Homeland Security said in warnings. It would be groups operating from Iran and China. The group actively searches the Internet for […]

Security

NCSC: Mitigating malware and ransomware attacks

NCSC learns from every incident and that is brings advice to reduce the chance that organizations will become infected with ransomware and malware and limit the spread of malware within the organization and the impact of the infection. it is important to emphasize two extra measures, namely having tested, up-to-date, offline backups and disabling or […]

Privacy Security

How to improve cyber security within your organisation?

NCSC published the following Small Business Guide for Cyber Security with the following steps for which ID Control gives some free trials of cloud security services: Backing up your data; Protecting your organization from malware (f.e. https://antivirusservice.eu/ ); Keep your mobile devices safe (f.e. https://antivirusservice.eu/ ); Using password to keep your data safe (f.e. https://idcontrol.pw); Avoid phishing attacks. […]

Privacy Security

FBI: how to recognize malicious web stores?

The FBI has provided Internet users with tips for recognizing malicious web stores. According to the U.S. Service, there is an increase in the number of victims being tracked down through fake online stores. The US regulator FTC also reports an increase in the number of shoppers who do not receive ordered goods. These include […]

Privacy Security

8 recommendations for working from home safely.

Safe working from home not under control? Then follow the following 8 recommendations to work from home safely: Set up two-factor authentication for administrators. Set up two-factor authentication for regular users. Avoid using administration rights with normal users. Record what users do within your environment. Set ‘alerts’ to receive notifications about strange activities. Know the […]