Cyber attackers regularly exploit unpatched software vulnerabilities, but they continuously target security misconfigurations to gain initial access into victims systems. The US Cybersecurity and Infrastructure Security Agency (CISA), FBI and NSA, as well as cybersecurity authorities from Canada, New Zealand, the Netherlands, and the UK, have created a to-do list for defenders in today’s heightened […]
Cloud computing services have become a vital tool for businesses. These services often include servers, databases, software, networks, analytics and other computing functions that can be operated through the cloud. This trend has accelerated in recent years, with cloud-based services such as Zoom, Microsoft 365 and Google Workspace and many others becoming the collaboration and productivity tools of choice […]
What’s your most valuable online account, the one most deserving of protection? If you use a Microsoft account to sign in to a Windows PC, that account and its associated email address should be the one you guard most. That’s especially true if you use that Microsoft account for OneDrive storage and documents that you […]
It’s no secret that there are many dangers when protecting online accounts with only basic password-based authentication. Despite this, the transition to stronger forms of authentication has been slow. As consumers and businesses become wiser to the imperative of better protecting their accounts, they realize that two- and multi-factor authentication is a must have. The National Cyber Security Centre (NCSC) recommends 2FA for all […]