Remove tag personal-information
article thumbnail

Ransomware Protection in 2021

eSecurity Planet

The internet is fraught with peril these days, but nothing strikes more fear into users and IT security pros than the threat of ransomware. A ransomware attack is about as bad as a cyber attack can get. Jump to: What is ransomware? How ransomware works. Preventing ransomware. Ransomware attacks and costs.

article thumbnail

How personal social media use can become a corporate problem

IT Governance

Most of us use social media to keep in touch with friends, read interesting content or share photos, but we also know it comes with risk. How private our data really is and whether or not “they” are listening is constantly in the news, but do you know the risks of personal social media use to your business? Oversharing.

Education 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wireless Security: WEP, WPA, WPA2 and WPA3 Explained

eSecurity Planet

Limiting use of a device’s administrator account where possible for greater personal device security. This works by allowing the IoT device to present a QR code or a Near Field Communication (NFC) tag, which the user can scan with their device to establish a secure Wi-Fi connection.

article thumbnail

7 Ways to Keep Employees Safe from the Scariest Cyber Threats

KnowBe4

Even the best-intentioned employees can sometimes do scary things that expose your organization to security risk. It’s well-established that humans are one of today’s greatest corporate risk vector. Protecting Sensitive Information. Sensitive information comes in many forms, sometimes in ways employees may not even be aware of.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Now information technologies and the information revolution are again transforming society. Part 2 will discuss the critical factors for a successful DT journey, because organizations need to do a “mind-shift” from traditional records and information management (RIM) practices to content services (CS). Introduction.

article thumbnail

Is the Resurgence of Phishing Attacks A Cause For Concern?

Adapture

The malware can be a system-locking ransomware, a credential-stealing keylogger, a network-crippling worm, or just about any havoc-wreaking miscreant. The website, on the other hand, usually contains additional content and a form urging the victim to submit confidential information (e.g. login credentials, personal data, etc).

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

I kind of felt like it was giving back a bit to the community that I had kind of taken a lot from like when I was growing up by being IRC channels, and I had found the internet, all this information that was available. And each one of these red dots represents the location of a smart meter. This one for 1783 days.