Cybercriminals are making a killing selling access to business networks

Hackers are earning massive amounts of money selling access to compromised networks on the dark web, a new paper from cyber threat intelligence firm IntSights asserts. The company’s researchers sifted through both Russian and English-speaking dark web forums and found that attackers often sell access to compromised networks to other groups.  Sometimes they found they were not skilled enough to …

Tovább a bejegyzéshez

Ransomware operators often purchase access to corporate networks

Cybercriminals that manage to break into corporate networks are rarely the ones to conduct ransomware attacks, new research from Proofpoint reveals.  Instead, according to the security firm, “first-stage” attackers usually sell network access on the black market to other groups, who then deliver the malicious payload. What’s more, multiple groups often use the same malware to distribute their ransomware.  “Cybercriminal …

Tovább a bejegyzéshez

Designing a secure remote access plan

  For many organizations, prior to last year, remote access was a “nice to have.” Now that we’ve all flashed forward to 2021, it’s a business continuity essential. With predictions that remote work will double its pre-pandemic levels and with cyberattacks on remote workers on the rise, it’s imperative for organizations to think through how and when they allow employees …

Tovább a bejegyzéshez

The need for context-based access in a remote work world

Identity management and access governance is critical for enterprises in a world where the threat and regulatory landscapes are continually evolving. A lack of access control and automated provisioning can be costly for your organization, in more ways than one. It means new employees and contractors may be given access to systems they should not have access to and that can …

Tovább a bejegyzéshez

Cybercriminals are more concerned about gaining ‘high-value access’ than ever

Almost all cybersecurity executives will tell you that attackers are increasingly intent on stealing login credentials from their company. This is according to a new report from identity security firm CyberArk, which says that the trend of moving assets to the cloud has triggered a race among criminals to steal as many credentials as possible. Based on a poll of …

Tovább a bejegyzéshez

Empowering dispersed workforces – why secure remote access has never been more important

Over the past several years, we have seen many organizations focus on the race towards digital transformation. However, up until now, the move towards digital and cloud-based services has been seen as a journey. There is no denying the events of 2020 have acted as a watershed moment and kicked many organizations into overdrive. As we head into next year, …

Tovább a bejegyzéshez

Giving rural areas access to reliable internet services will be pivotal in 2021

2020 has been one of the most challenging years in recent history. In a time when many of us have been physically separate from those we love, internet connectivity has provided a lifeline for many. From remote working and video calling, to online deliveries and endless hours of streaming, it has become even more central to our lives. However, the …

Tovább a bejegyzéshez

Private Internet Access (PIA) VPN review

Private Internet Access (also called PIA) is an outstanding VPN provider owned by Private Internet, the same company who is also the proud owner of other celebrated platforms like ZenMate and CyberGhost. It features a huge network of P2P-friendly servers that includes over 19,480 units scattered across 76 countries, native clients for Windows, Mac, iOS, Android, and Linux, browser extensions …

Tovább a bejegyzéshez

IaaS visibility and access management could be key to stopping cyberattacks

Almost half of the world’s organizations have suffered a cyberattack due to poor infrastructure-as-a-service (IaaS) visibility and access management. This is according to a new report from SailPoint, which claims that businesses are failing to prioritize proper identity governance controls for IaaS platforms as they would for other parts of the business. Making matters worse, three quarters of businesses use …

Tovább a bejegyzéshez