A massive number of businesses suffer email breaches

Email is still one of the most successful attack vectors for criminals looking to breach a company. A new report from email security solutions provider Hornetsecurity Group, based on a poll of 420 firms, says that one in four businesses suffered an email-related security breach in the past year. In 36 percent of cases, these email-related breaches were caused by …

Tovább a bejegyzéshez

Phishing attacks hit a huge number of businesses last year

In the past year, almost three-quarters (73 percent) of businesses suffered a data breach as a result of a successful phishing campaign. The trend can be partly attributed to remote working, as businesses struggle to maintain visibility and protect their remote workers, a new report from Egress suggests. Based on a poll of 500 IT leaders and 3,000 employees in …

Tovább a bejegyzéshez

A massive number of enterprise devices suffer security deficiencies

A quarter of all enterprise devices have poor security configurations, leaving sensitive data up for grabs, a new report from Absolute Software claims. The Endpoint Risk Report says these devices contain “unhealthy or ineffective” security applications such as encryption, antivirus, or VPN solutions. Other major problems include the number of security controls, as well as their functions. The number rose …

Tovább a bejegyzéshez

A growing number of hackers are fighting back after their attacks are mitigated

When an organization is under attack, there are a number of tactics and tools that can be deployed in response. However, cybercriminals are becoming increasingly adept at identifying and countering remediation efforts, a practice known as counter incident response. According to a new report from VMware, the majority of businesses (63 percent) have been subjected to counter incident response (IR) …

Tovább a bejegyzéshez

An increasing number of firms are shifting network resources to the edge

By next year, edge deployment of network resources will increase by almost half (40 percent), a new report from IDC and Limelight Networks suggests. According to the “Outlook for Edge Services” paper, 60 percent of all network resources will be deployed at remote edge or service provider locations by 2022, up from 20 percent today. Beyond providing greater agility, the …

Tovább a bejegyzéshez

VPNs are causing a number of problems for businesses

A Virtual Private Network (VPN) is generally considered a must-have for businesses looking to keep the data that flows through the network safe and secure. However, most organizations also report problems with using the tool. This is according to a new report DH2i, based on a poll of 228 respondents across IT job functions and industries, which argues that most …

Tovább a bejegyzéshez

A record number of DDoS attacks took place in 2020

In 2020, for the first time ever, more than 10 million Distributed Denial of Service (DDoS) attacks were recorded in a single year. This is according to a new report from cybersecurity firm Netscout, whose ATLAS Security Engineering and Response Team (ASERT) observed a total of 10,089,687 attacks last year. Compared to 8.5 million attacks in 2019, that’s a 17 …

Tovább a bejegyzéshez

Number of infected IoT devices has doubled since last year

The number of infected Internet of Things (IoT) devices has doubled since last year, a new report from Nokia states. The Nokia Threat Intelligence Report claims that IoT devices accounted for 16 percent of all infected machines in 2019, but this year the figure jumped to 33 percent. The company bases its findings on data aggregated from monitoring network traffic …

Tovább a bejegyzéshez

Microsoft says new experimental architecture could cut number of necessary security patches

For quite some time now, Rust has been touted as a potential replacement for C++ when it comes to writing some Windows components. Some consider C++ outdated and Microsoft itself even acknowledges that switching to Rust could eliminate the need for constant security patches. This is mostly because the majority of vulnerabilities revolve around memory-safety – an issue allegedly inherent …

Tovább a bejegyzéshez