Remove Communications Remove Education Remove Exercises Remove Security
article thumbnail

GUEST ESSAY: Top 5 cyber exposures tied to the rising use of international remote workforces

The Last Watchdog

With many employees now working remotely, securing company data isn’t as straightforward as it used to be. International workforces can be an excellent way to find top talent, but they can introduce unique security risks. Countries have different data security laws, and these can get in the way of one another. Unsecured Wi-Fi.

article thumbnail

China-linked Alloy Taurus APT uses a Linux variant of PingPull malware

Security Affairs

PingPull, was first spotted by Unit 42 in June 2022, the researchers defined the RAT as a “difficult-to-detect” backdoor that leverages the Internet Control Message Protocol (ICMP) for C2 communications. Experts also found PingPull variants that use HTTPS and TCP for C2 communications instead of ICMP. org over port 8443 for C2.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

President Biden Signs Two Bills Aimed at Enhancing Government Cybersecurity

Hunton Privacy

The Cybersecurity Act amends certain provisions of the Homeland Security Act of 2002. Department of Homeland Security (“DHS”) and state, local, tribal and territorial governments, as well as corporations, associations and the general public. 2520) (the “Cybersecurity Act”) and the Federal Rotational Cyber Workforce Program Act (S.

article thumbnail

How to create a cyber incident response plan when you have a hybrid workforce

IT Governance

That made planning for disruptions comparatively straightforward: you knew where everyone was located, you had complete visibility over your threat landscape and you could communicate with everyone directly. Protect your communication channels. Educate employees on their responsibilities. But hybrid working complicates that.

article thumbnail

New SEC Cybersecurity Rules Could Affect Private Companies Too

eSecurity Planet

Securities and Exchange Commission (SEC) strongly advised public companies to improve their cybersecurity. While the new security proposals have not yet become law, cybersecurity managers can begin to prepare metrics and audits that will not only help comply with those laws, but can also help create positive change now.

article thumbnail

France: The CNIL publishes a practical guide on Data Protection Officers

DLA Piper Privacy Matters

Among the organizations that have designated a DPO, the most represented sectors are, unsurprisingly, the public administration, education and health sectors. the detail of the CNIL online DPO designation form and information to be communicated to the CNIL in that respect. The Guide is composed of four main Parts : I.

GDPR 116
article thumbnail

Spear Phishing Prevention: 10 Ways to Protect Your Organization

eSecurity Planet

Individuals and organizations should prioritize security awareness training, implement email security measures, and encourage vigilance when dealing with unusual or urgent requests. In order to send a message, they could be using spoof email addresses, making use of compromised accounts, or exploiting weak security measures.