Cyber Security

591

Solutions

908

Contributors

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Share tech news, updates, or what's on your mind.

Sign up to Post

[Newsflash] Get a highly available system for cyber protection    

SDI3.pngThe hyper-converged infrastructure market is on pace to grow from $4.1 billion to $17.1 billion by 2023 and demand for cyber protection solutions is a big reason why. Managed service providers have the opportunity to claim their share of the market by delivering cost-effective, efficient and secure cyber protection solutions – but it requires the right tools.

The new Acronis SDI Appliance ensures that IT pros can access a highly available system, which combines universal storage and high-performance virtualization.

Using just one efficient and secure solution, you can guarantee data safety and authenticity by delivering cyber protection services that meet today’s IT demands:

- Simplify cyber protection tasks
- Ensure high availability and resiliency
- Access reliable, affordable hybrid-cloud data protection
- Get integrated support for virtualization and beyond
- Achieve superior performance

Meet the Acronis SDI Appliance


The Acronis SDI Appliance is a new plug-n-play solution with pre-configured Acronis Software-Defined …
0
5 Ways Acronis Skyrockets Your Data Protection
5 Ways Acronis Skyrockets Your Data Protection

Risks to data security are risks to business continuity. Businesses need to know what these risks look like – and where they can turn for help.
Check our newest E-Book and learn how you can differentiate your data protection business with advanced cloud solutions Acronis delivers

Just received a phishing sms text message attempting to look like an Amazon delivery alert. Very clever. Stay safe out there!
amazon phishing sms message
3
Fake call centres raided. About time. Probably won't stop them but at least slows them down.
https://nakedsecurity.sophos.com/2018/12/03/microsoft-cracks-down-on-tech-support-scams-16-call-centers-raided
1
15_years_.jpg Acronis Celebrates 15 Years of Cyber Protection!
Explore Acronis' History https://15.acronis.com 
0
Zero Downtime How to prioritize workloads during total downtime? Consider:
- The order in which workloads should be brought up
- Which workloads should have redundancy and failover
- Which workloads can wait or should be stopped to free resource capacity
https://bit.ly/2yb7Wqh
0
Keep your business safe from Ransomware Two ransomware attacks to international ports happened recently, at San Diego and Barcelona. Our experts recommend four simple steps to ensure your files, apps, and systems stay safe https://bit.ly/2Nl5UZn
0
Ransomware is the next big security threat. Don’t be a victim. Prepare your business for fast and easy backup now https://bit.ly/2O0FO34 
1
Bankrupt Company's Data Resold on Craigslist

Heads up for any members who have ever purchased through NCIX. Looks like their server equipment was sold off without being scrubbed.
This is a good reminder about letting a third party store your credit card data.
https://nakedsecurity.sophos.com/2018/09/24/bankrupt-ncix-customer-data-resold-on-craigslist/
2
LVL 49

Expert Comment

by:noci
They can sell the data to any company that continues the business (as a whole)  in one part.  (restart of business with new owners)...
(that is data that will still be used for what it was provided for.... ) Data is NOT provided for anything else then conducting business with THIS company.   (If EU customers are part of the data GDPR is important here, or even if non-EU citizens did business from the EU).
So there is no license on the data for a lot of different things.
0
LVL 49

Expert Comment

by:noci
The new  owner of the data ALSO inherrits this license/restriction on the data is not that  the data is free for all after it has been flogged off... (In legal theory...,  i am afraid it will be a free for all in practice).
0
Exploring SharePoint 2016
LVL 13
Exploring SharePoint 2016

Explore SharePoint 2016, the web-based, collaborative platform that integrates with Microsoft Office to provide intranets, secure document management, and collaboration so you can develop your online and offline capabilities.

In 2017, the number of vulnerabilities detected in applications rose 33%. Is your company prepared to deal with these risks? Train to become a Certified Penetration Testing Engineer today! There are only two days left to enroll in this month’s Course of the Month.
2

[Free Webinar] Ten Security Controls for effective Cybersecurity


cyber-webinar-1200x627.jpgWith cyberattacks evolving everyday organizations are forced to build a strong security layer to keep their data safe and maintain user privacy. With so much touch points to improve organization security, ManageEngine is here to facilitate things for you, by hand picking 10 primary security controls which you need to practice to keep the attackers at bay.

Attend our webinar about cybersecurity on April 24th, 11 am BST and make sure you have the best security measures in place for 2018.

Register Now: https://goo.gl/R16u4f
0
Did you know it only takes 2 hours for a security patch to be reversed engineered? Don’t let your company’s vulnerabilities go unsupervised. Enroll in March’s Course of the Month to begin training for your Certified Penetration Testing Engineer Certification today.
1
Obtain real-world security knowledge that allows you to recognize vulnerabilities, exploit system weaknesses, and safeguard threats. Enroll in March's Course of the Month to ensure you attain a higher level of cyber security.
0
2
Be on the lookout for exciting changes coming to our course offering! With an additional 1500+ courses ranging in topics from cybersecurity and IT management to business practices and HR, there will be something for everyone. What courses would you like to see?
6
LVL 5

Author Comment

by:Randal Redberg
Hi Andrew,

I fully agree. We look forward to working with you and other long term memebers of the site to help us fill in the voids and provide valuable resources to the member base.

Thank you for your input.

Randy
0

Expert Comment

by:Jack Senesap
anything with cyber security is good with me.
0
Learn how to mitigate the new intel bugs Meltdown & Spectre,

Join this free #webinar titled "How to mitigate #Meltdown and #Spectre bugs" on Jan 10, 11:00 am EDT to get hands on experience, clarify your doubts , fix the exploit and get back to your routines.

https://www.manageengine.com/products/desktop-central/meltdown-and-spectre-webinar.html?ee

melt-webinar-social-banner.jpg
0

TeamViewer hacked: Here’s how to protect your systems


Hi there,

TeamViewer can be exploited using a vulnerability allowing users to switch between viewer and presenter side, or remotely control the server. If you are using TeamViewer in your enterprise, do act now.

Read more: https://goo.gl/2E65yX
1
Get a highly available system for cyber protection
Get a highly available system for cyber protection

The Acronis SDI Appliance is a new plug-n-play solution with pre-configured Acronis Software-Defined Infrastructure software that gives service providers and enterprises ready access to a fault-tolerant system, which combines universal storage and high-performance virtualization.

5 tips for seamless endpoint security

Hey there,

Are you worried about your endpoints being hacked or breached?

Here is a simple tips to build the best endpoint security in your enterprise.

Building an effective endpoint security has become all time priority for enterprises. With the amount of cyber attacks evolving day by day, enterprises have to practice certain simple best practices tosimple tips to build the best endpoint security keep them vigilant against any unforeseen vulnerability breaches.

Read more: https://goo.gl/taAmSB
0
Uber paid hackers $100,000 to keep data breach quiet  

The BBC reported earlier today that Uber did not tell anyone about the breach that affected 57 million customers and drivers.

David Kennerly, director of threat research at security company Webroot, criticized Uber for paying a ransom to the hackers.

"Given the current climate around data security and breaches, it is astonishing that Uber paid off the hackers and kept this breach under wraps for a year. The fact is there is absolutely no guarantee the hackers didn't create multiple copies of the stolen data for future extortion or to sell on further down the line."

What's worse than being hacked? Covering up a hack.
4
Webroot Doubles Down on MSPs

"Some of the new offerings involved acquisitions. Others are homegrown. But they’re all coming together. Indeed, Webroot is coordinating its R&D, sales and marketing efforts to make it easier MSPs to try, buy and deploy the security solutions, Potts says."

Read the rest of the article here.
1
By combining a range of threat technologies, deployed over numerous stages, cybercriminals maximize the likelihood of infection success.

Here are 5 tips to help MSPs achieve a multi-layered cybersecurity strategy.

What's your multi-layered approach?
0
2-Post-Native-Image-360-x-200.jpgThe Private Question Feature is back on-site! Learn how we are protecting your tech question security.
2
Top 10 Nastiest Ransomware Attacks of 2017

Nastiest-Ransomware.png
We’re revealing the top 10 nastiest ransomware attacks from the past year. NotPetya came in on our list as the most destructive ransomware attack of 2017, followed closely by WannaCry and Locky in the number two and three spots, respectively. NotPetya took number one because of its intent to damage a country’s infrastructure. Unlike most ransomware attacks, NotPetya’s code wasn’t designed to extort money from its victims, but to destroy everything in its path.

Check out the entire list here.

0

Cyber Security

591

Solutions

908

Contributors

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.