What's Your IT Question?

Want to know more about this topic or about us? Contact us!

All posts in Security

Even after armed with defense tools, CISOs say successful cyberattacks are ‘inevitable’: New study

Image: CROCOTHERY/Adobe Stock In Cisco’s new Cybersecurity Readiness Index, only 15% of respondents to the global survey said their organizations have implemented security programs mature enough to defend against current cybersecurity risks. While most enterprises have some collection of cybersecurity measures deployed, a full 82% of the 6,700 chief information . . . Read more

Massive adversary-in-the-middle phishing campaign bypasses MFA and mimics Microsoft Office

Microsoft has already seen millions of phishing emails sent every day by attackers using this phishing kit. Learn how to protect your business from this AitM campaign. Image: dvoevnore/Adobe Stock New research from Microsoft’s Threat Intelligence team exposed the activities of a threat actor named DEV-1101, which started advertising for . . . Read more

8 best enterprise accounting software for 2023

Gone are the days of the spreadsheet for keeping tabs on critical business finances. Now, software platforms are available to do the heavy lifting for you. Enterprise accounting software helps companies manage and track their financials, from accounts payable to payroll. However, these platforms don’t stop there. Enterprise accounting software . . . Read more

Report: Too many enterprises have shadow IT – unlocked doors with no cameras

New report says far too many firms have too many IT assets they cannot see or aren’t using, with some Windows servers lacking endpoint protection and patch management. Image: Askha/Adobe Stock If you are lucky enough to have a Lambo in your garage, you’ll surely have cameras at least on . . . Read more

BECs double in 2022, overtaking ransomware

A look at 4th quarter 2022, data suggests that new threat surfaces notwithstanding, low-code cybersecurity business email compromises including phishing, as well as MFA bombing are still the prevalent exploits favored by threat actors. Image: Adobe Stock Cybersecurity defenders peering into the fog hoping to catch a glimpse of the . . . Read more

First Dero cryptojacking campaign targets unprotected Kubernetes instances

Learn how this cryptocurrency campaign operates and its scope. Then, get tips on protecting vulnerable Kubernetes instances from this cybersecurity threat. Image: Pixabay The cybersecurity company CrowdStrike has observed the first-ever Dero cryptojacking campaign. The attack targets Kubernetes clusters that were accessible on the internet and allowed anonymous access to . . . Read more

Running WordPress on Azure for secure, fast and global content delivery

Learn about Microsoft’s WordPress on Azure App Service, as well as an interesting alternative from WP Engine. Image: Hugo Baeta Twenty years old this year, WordPress remains one of the most popular content management tools. Running a WordPress instance requires a web server and a database, an ideal combination for . . . Read more