article thumbnail

GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted

The Last Watchdog

Fortunately, effective tools and wise best practices can help mitigate this this exposure enabling companies to indefinitely leverage Exchange Server as a productive, resilient and secure communications tool. These practices are foundational for maintaining the security and operational integrity of Exchange Server environments.

Risk 264
article thumbnail

GUEST ESSAY: ‘CyberXchange’ presents a much-needed platform for cybersecurity purchases

The Last Watchdog

For organizations looking to improve their security posture, this is causing confusion and vendor fatigue, especially for companies that don’t have a full time Chief Information Security Officer. Traditional channels for choosing the right security solutions are proving to be increasingly ineffective.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Here’s how and why ‘trust’ presents an existential threat to cybersecurity

The Last Watchdog

This neglect is not only a threat to personal data, but also a threat to corporate security. According to our survey, the majority of consumers (77 percent) are confident they can identify, and report suspected malicious cyber activity despite general apathy toward proactively securing their devices and personal data. Confidence gap.

article thumbnail

GUEST ESSAY: A primer on content management systems (CMS) — and how to secure them

The Last Watchdog

Wikipedia uses a CMS for textual entries, blog posts, images, photographs, videos, charts, graphics, and “ talk pages ” that help its many contributors collaborate. Security is essential for a CMS. The newer “headless” CMS, running in the cloud, contains everything but the presentation system. Best security practices.

CMS 262
article thumbnail

Security Vulnerability of Switzerland’s E-Voting System

Schneier on Security

Like any internet voting system, it has inherent security vulnerabilities: if there are malicious insiders, they can corrupt the vote count; and if thousands of voters’ computers are hacked by malware, the malware can change votes as they are transmitted. He explains it all in his blog post. Again, the solution is paper.

Paper 126
article thumbnail

Securing AI Deployments: Striking the Balance

OpenText Information Management

If it’s not accurate, accessible, and secure, organizations won’t get the desired results. Since AI relies on data to learn and improve, organizations must ensure their data is accurate, accessible, and secure. It also enables change notifications, lifecycle management, security lockdown, and security fencing.

article thumbnail

Is Your Chip Card Secure? Much Depends on Where You Bank

Krebs on Security

based merchants suggest thieves are exploiting weaknesses in how certain financial institutions have implemented the technology to sidestep key chip card security features and effectively create usable, counterfeit cards. But a recent series of malware attacks on U.S.-based A chip-based credit card. Image: Wikipedia.

Security 359