[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Cyber Security

571

Solutions

893

Contributors

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Share tech news, updates, or what's on your mind.

Sign up to Post

Fake call centres raided. About time. Probably won't stop them but at least slows them down.
https://nakedsecurity.sophos.com/2018/12/03/microsoft-cracks-down-on-tech-support-scams-16-call-centers-raided
1
Acronis True Image 2019 just released!
LVL 1
Acronis True Image 2019 just released!

Create a reliable backup. Make sure you always have dependable copies of your data so you can restore your entire system or individual files.

15_years_.jpg Acronis Celebrates 15 Years of Cyber Protection!
Explore Acronis' History https://15.acronis.com 
0
Zero Downtime How to prioritize workloads during total downtime? Consider:
- The order in which workloads should be brought up
- Which workloads should have redundancy and failover
- Which workloads can wait or should be stopped to free resource capacity
https://bit.ly/2yb7Wqh
0
Keep your business safe from Ransomware Two ransomware attacks to international ports happened recently, at San Diego and Barcelona. Our experts recommend four simple steps to ensure your files, apps, and systems stay safe https://bit.ly/2Nl5UZn
0
Ransomware is the next big security threat. Don’t be a victim. Prepare your business for fast and easy backup now https://bit.ly/2O0FO34 
1
Bankrupt Company's Data Resold on Craigslist

Heads up for any members who have ever purchased through NCIX. Looks like their server equipment was sold off without being scrubbed.
This is a good reminder about letting a third party store your credit card data.
https://nakedsecurity.sophos.com/2018/09/24/bankrupt-ncix-customer-data-resold-on-craigslist/
2
LVL 46

Expert Comment

by:noci
They can sell the data to any company that continues the business (as a whole)  in one part.  (restart of business with new owners)...
(that is data that will still be used for what it was provided for.... ) Data is NOT provided for anything else then conducting business with THIS company.   (If EU customers are part of the data GDPR is important here, or even if non-EU citizens did business from the EU).
So there is no license on the data for a lot of different things.
0
LVL 46

Expert Comment

by:noci
The new  owner of the data ALSO inherrits this license/restriction on the data is not that  the data is free for all after it has been flogged off... (In legal theory...,  i am afraid it will be a free for all in practice).
0
In 2017, the number of vulnerabilities detected in applications rose 33%. Is your company prepared to deal with these risks? Train to become a Certified Penetration Testing Engineer today! There are only two days left to enroll in this month’s Course of the Month.
2
The IT Degree for Career Advancement
The IT Degree for Career Advancement

Earn your B.S. in Network Operations and Security and become a network and IT security expert. This WGU degree program curriculum was designed with tech-savvy, self-motivated students in mind – allowing you to use your technical expertise, to address real-world business problems.

[Free Webinar] Ten Security Controls for effective Cybersecurity


cyber-webinar-1200x627.jpgWith cyberattacks evolving everyday organizations are forced to build a strong security layer to keep their data safe and maintain user privacy. With so much touch points to improve organization security, ManageEngine is here to facilitate things for you, by hand picking 10 primary security controls which you need to practice to keep the attackers at bay.

Attend our webinar about cybersecurity on April 24th, 11 am BST and make sure you have the best security measures in place for 2018.

Register Now: https://goo.gl/R16u4f
0
Did you know it only takes 2 hours for a security patch to be reversed engineered? Don’t let your company’s vulnerabilities go unsupervised. Enroll in March’s Course of the Month to begin training for your Certified Penetration Testing Engineer Certification today.
1
Obtain real-world security knowledge that allows you to recognize vulnerabilities, exploit system weaknesses, and safeguard threats. Enroll in March's Course of the Month to ensure you attain a higher level of cyber security.
0
onsite.jpgIntroducing our March Course of the Month: Certified Penetration Testing Engineer Series
Enroll today to learn from a cybersecurity expert with more than 20 industry-recognized certifications and add this invaluable training to your resume. Bonus: This series, valued at $3,000, is free for Premium Members, Qualified Experts, and Team Accounts.
0
2
Be on the lookout for exciting changes coming to our course offering! With an additional 1500+ courses ranging in topics from cybersecurity and IT management to business practices and HR, there will be something for everyone. What courses would you like to see?
6
LVL 5

Author Comment

by:Randal Redberg
Hi Andrew,

I fully agree. We look forward to working with you and other long term memebers of the site to help us fill in the voids and provide valuable resources to the member base.

Thank you for your input.

Randy
0

Expert Comment

by:Jack Senesap
anything with cyber security is good with me.
0
Learn how to mitigate the new intel bugs Meltdown & Spectre,

Join this free #webinar titled "How to mitigate #Meltdown and #Spectre bugs" on Jan 10, 11:00 am EDT to get hands on experience, clarify your doubts , fix the exploit and get back to your routines.

https://www.manageengine.com/products/desktop-central/meltdown-and-spectre-webinar.html?ee

melt-webinar-social-banner.jpg
0

TeamViewer hacked: Here’s how to protect your systems


Hi there,

TeamViewer can be exploited using a vulnerability allowing users to switch between viewer and presenter side, or remotely control the server. If you are using TeamViewer in your enterprise, do act now.

Read more: https://goo.gl/2E65yX
1
5 tips for seamless endpoint security

Hey there,

Are you worried about your endpoints being hacked or breached?

Here is a simple tips to build the best endpoint security in your enterprise.

Building an effective endpoint security has become all time priority for enterprises. With the amount of cyber attacks evolving day by day, enterprises have to practice certain simple best practices tosimple tips to build the best endpoint security keep them vigilant against any unforeseen vulnerability breaches.

Read more: https://goo.gl/taAmSB
0
Active Protection takes the fight to cryptojacking
LVL 1
Active Protection takes the fight to cryptojacking

While there were several headline-grabbing ransomware attacks during in 2017, another big threat started appearing at the same time that didn’t get the same coverage – illicit cryptomining.

Uber paid hackers $100,000 to keep data breach quiet  

The BBC reported earlier today that Uber did not tell anyone about the breach that affected 57 million customers and drivers.

David Kennerly, director of threat research at security company Webroot, criticized Uber for paying a ransom to the hackers.

"Given the current climate around data security and breaches, it is astonishing that Uber paid off the hackers and kept this breach under wraps for a year. The fact is there is absolutely no guarantee the hackers didn't create multiple copies of the stolen data for future extortion or to sell on further down the line."

What's worse than being hacked? Covering up a hack.
4
Webroot Doubles Down on MSPs

"Some of the new offerings involved acquisitions. Others are homegrown. But they’re all coming together. Indeed, Webroot is coordinating its R&D, sales and marketing efforts to make it easier MSPs to try, buy and deploy the security solutions, Potts says."

Read the rest of the article here.
1
By combining a range of threat technologies, deployed over numerous stages, cybercriminals maximize the likelihood of infection success.

Here are 5 tips to help MSPs achieve a multi-layered cybersecurity strategy.

What's your multi-layered approach?
0
2-Post-Native-Image-360-x-200.jpgThe Private Question Feature is back on-site! Learn how we are protecting your tech question security.
2
Top 10 Nastiest Ransomware Attacks of 2017

Nastiest-Ransomware.png
We’re revealing the top 10 nastiest ransomware attacks from the past year. NotPetya came in on our list as the most destructive ransomware attack of 2017, followed closely by WannaCry and Locky in the number two and three spots, respectively. NotPetya took number one because of its intent to damage a country’s infrastructure. Unlike most ransomware attacks, NotPetya’s code wasn’t designed to extort money from its victims, but to destroy everything in its path.

Check out the entire list here.

0
2-Post-Native-Image-360-x-200.jpgBack by popular demand, the Private Question feature allows Premium Members, Team Accounts, and Qualified Experts to ask questions that can only be seen by Experts Exchange Members, while still linking to their profile for building rapport and connections on site. The return of Private Question adds to the question security options available to these member groups, including Anonymous Question.
2

Cyber Security

571

Solutions

893

Contributors

The cyber security specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. cyber security focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against the harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.