article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

In more light-hearted news, Amazon’s Alexa voice assistant unsettled users by randomly laughing , which, somewhat unsurprisingly, caused many Twitter users to draw comparisons with HAL 9000 refusing to open the pod bay doors in 2001: A Space Odyssey. Users were encouraged to change their passwords. I’m sorry, Dave.

article thumbnail

CyberheistNews Vol 13 #27 [Heads Up] Massive Impersonation Phishing Campaign Imitates Over 100 Brands and Thousands of Domains

KnowBe4

Use PasswordIQ to find which users are sharing passwords and which ones have weak passwords See the fully automated user provisioning and onboarding Find out how 60,000+ organizations have mobilized their end-users as their human firewall. Executive Reports - Create, tailor and deliver advanced executive-level reports NEW!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

For users familiar with password management and the value of complex passwords, this makes sense. Not every application or network requires military-grade encryption – however, enterprise organizations can’t go wrong with the services offering the most strength. The Importance of Encryption. The Move to HTTPS.

article thumbnail

A Cyber Insurance Backstop

Schneier on Security

11, 2001, terrorist attacks. Observers do, however, have a pretty good idea who was behind the NotPetya attack because several governments, including the United States and the United Kingdom, issued coordinated statements blaming the Russian military. The 9/11 attacks cost insurers and reinsurers $47 billion.