Ransomware on the rise

— Public infrastructure bodies have never been more vulnerable to cyber threats. Cybersecurity firm SentinelOne discovered that 23 out of the 58 UK universities questioned had been held to ransomware. Bournemouth University, which has its own cyber security centre, was hit 21 times this last year. Full Story

5 Easy Things Channel Partners Can Do to Protect Customers Against SMB Security Threats

— Most large enterprises are painfully aware of their security vulnerabilities and are proactively working to mitigate risks. But recent research has proven that small and midsize businesses (SMBs) don’t fully recognize how high the likelihood is that they’ll suffer an attack or the business implications surrounding such vulnerabilities. Moreover, they’re not fully aware of all of the facets of a well-rounded cyber defense. These days, it’s about way more than firewalls and antivirus software. Full Story

Are unsecure medical devices opening the backdoor for hackers?

— The increased adoption of connected devices into medical services and processes, is streamlining and improving the manner in which medicine can be tracked, developed, sourced and distributed. On call/off site medical staff are also able to access information and source medicine on site, improving service levels and productivity. However the exponential advantages of integrating connected devices into this industry can potentially open up points of vulnerability which should increase security fears for decision makers. Full Story

New products of the week 8.1.16

— Privileged Access Management empowers professionals to control, monitor and manage privileged users’ access to critical systems. PAM 16.1 includes new features like 3D Touch and Touch ID support for iOS. Full Story

Five Lessons for Good Airport Security Practices

— Many people love living in the Tampa area for a lot of reasons, among them of course is having access to regular use one of the most popular airports in the USA - Tampa International Airport (TIA). Unfortunately for the people that run TIA, they experienced an IT security breach as reported in May. However, unlike a lot of the other organizations, because it is an international airport, the profile of the breach was far higher because of its security status. Full Story

Credit card security breached at local Cicis restaurants

— More than 130 Cicis Pizza locations, including Waco’s at 1609 N. Valley Mills Drive, Bellmead’s at 910 North Loop 340, Suite 4, and Killeen’s at South Fort Hood Street, have suffered a security breach that could compromise information on payment cards used at the stores, the company announced Monday. Full Story

Is Tech Support getting worse on purpose?

— There's an old saying in the tech world, "technology works great, except when it doesn't." We've all been there, right? Check out this podcast on the battle between technology, users and technical support. Full Story

The three major security implications of the IoT

— Infosec pros have spent the past decade fighting a rising tide of both more users and more devices connecting to enterprise resources while at the same time trying to decrease the attack surface — that is, trying to shut down as many points of access as possible. Much of this is usually attempted by first inventorying connections, consolidating network systems and targeted servers, building portals to cut down on remote access, and advanced correlation of security events by a central security element. Full Story

Millennials Bring New Workplace Cybersecurity Challenges

— As Baby Boomers increasingly exit the workforce and Millennials move in to take their places, HR professionals must assess and mitigate the cybersecurity risks posed by new workers who grew up in the digital age, according to a new study by Software Advice, headquartered in Austin, Texas. Full Story

The evolving face of cybercrime

— The evolution of cybercrime is multi-faceted – from social engineering integrating targeted spam and phishing attacks, to insider threats and vendor vulnerability. It’s becoming an intertwined network that’s increasingly difficult for CIOs, CISOs, and IT managers in organisations of all sizes to appraise and manage. Full Story

Elizabeth Hulsey | Public Relations Specialist Bomgar Corporation