Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ManageEngine

Artificial intelligence might be insulting your intelligence

It’s Saturday morning. You’ve decided to sleep in after last night’s bender, and you can’t be bothered about the sound of your phone ringing. You decide to brush it off and go back to sleep, but the phone won’t stop ringing. You wake up and scan your surroundings. Your wife’s missing. You let the phone ring until it’s silent and bury your head in your pillow to block out the splitting headache that’s slowly building up. A single message tone goes off.

Five worthy reads: Shielding mobile applications from cyberattackers

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we are exploring mobile malware attacks, how they have exploited users, and the ways to prevent them in the digital era. Design Credits: Dhanwant When was the last time you took a handwritten list to the grocery store instead of saving a list as a note or voice message on WhatsApp? Mobile phones have gone through a crazy evolution.

Securing your offline remote workforce with MFA

Twenty percent of IT enterprises experienced a breach due to a remote worker during the pandemic, says a report by Malwarebytes Labs. Choosing to let employees work remotely comes with pros and cons—the cons primarily being unanticipated security vulnerabilities. These vulnerabilities are more likely to occur because of employee ignorance, rather than a network or system malfunction.

Why endpoint management is your best defense against a recession

In the face of a looming recession, companies are hunting for ways to reduce costs and increase efficiency. The pressure is particularly felt by IT departments. In addition to reducing technology costs and investing as little as possible, they must adapt quickly to evolving user needs. Several reasons have led companies to cut costs recently: Your IT department can be prepared for whatever comes next by selecting the right set of tools based on your needs.

World Password Day: Tips, quiz, and tools to improve password security

Password security, though sometimes underrated, is crucial for an organization to remain viable in the vast digital landscape. A popular quote on the internet says, “A good neighbor is someone who does not put a password on their Wi-Fi.” However, for a good company, the opposite holds true, as they must thoroughly secure all their resources.

Why are passwords so difficult to remember?

We all have a lot of passwords to keep track of on a daily basis, whether they’re for shopping websites, emails, social media, or the workplace. It’s practically impossible to remember login information for each of them. But without these crucial bits of data, we can’t get to where we need to go online. It is estimated that over 300 billion passwords are currently in use, which equates to around 38.4 passwords per internet user.

Evolving cyberattack landscape: What to expect in the future

In today’s increasingly digitized world, cybersecurity has become an essential concern for individuals and businesses alike. With more and more data being transmitted and stored online, the risk of cyberattacks and data breaches has never been higher. The field of cybersecurity is rapidly growing and evolving, with new technologies emerging all the time.

Mitigating rogue devices with OpUtils: What you need to know

Over the past few years, IT companies adopted IoT, wireless and hybrid networks to stay competitive and to meet the demands of their clients. Among these networks, wireless networks are the most common and the most vulnerable to cyberattacks as hackers constantly try to penetrate them. A cyberattack is initiated by planting a rogue device in your organization’s network.

Lessons from LastPass: The time when BYOD became BYOB (bring your own breach)

Unfortunately, for LastPass and its users, this nightmare became a reality in August 2022 when a developer account was compromised. This led to a series of events that ultimately led to the exposure of sensitive customer data. A hacker exploited an employee to access the company’s data. But get this: the hacker exploited a three-year-old vulnerability that wasn’t patched. That’s like leaving your front door wide open for three years and being surprised when a burglar walks right in!