article thumbnail

Don’t Let Zombie Zoom Links Drag You Down

Krebs on Security

Many organizations — including quite a few Fortune 500 firms — have exposed web links that allow anyone to initiate a Zoom video conference meeting as a valid employee. The PMI portion forms part of each new meeting URL created by that account, such as: zoom.us/j/5551112222

article thumbnail

Analysis: Remote Workplace Security Challenges

Data Breach Today

The latest edition of the ISMG Security Report discusses the cybersecurity challenges posed by the work-at-home shift. Also featured: Tips from NIST on developing remote worker security policies, plus a discussion of the nascent threat of AI meeting assistants.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tips for Making Security Technology Purchase Decisions

Data Breach Today

How can organizations decide what security technologies best meet their needs? CISO Mark Eggleston shares his tips for making the right purchase decisions.

Security 104
article thumbnail

How to Maintain ISO 27001 Certification: 7 Top Tips

IT Governance

You must assemble a team, conduct a gap analysis and risk assessment, apply security controls, create documentation and perform staff awareness training. Your ISMS (information security management system) was built to address risks that you identified during the certification process, but the threat landscape is constantly evolving.

article thumbnail

GUEST ESSAY: The post-pandemic challenges of securely managing employee endpoints

The Last Watchdog

This raises the concerns of corporate data security in remote working that still stand as a key challenge that organizations are trying to navigate, workforce productivity being the second. Managing endpoints securely . This is also why looking for a solution with a holistic approach can be such a tipping point.

Security 258
article thumbnail

Start 2019 on the Right Foot With These Tips

AIIM

In today's digital world, the chance of information-related security breaches is high. Is your company's data security plan up to date and bullet proof? AIIM Chief Evangelist, John Mancini, is sharing top tips to help your organization: Understand the unique challenges posed by “unstructured” information and content.

article thumbnail

Meet Bluetana, the Scourge of Pump Skimmers

Krebs on Security

” One of the best tips for avoiding fuel card skimmers is to favor filling stations that have updated security features, such as custom keys for each pump, better compartmentalization of individual components within the machine, and tamper protections that physically shut down a pump if the machine is improperly accessed.