- Ask LH: How Can I Get My Girlfriend To Stop Playing Pokemon GO?
- Reminder: You Only Have One Week To Download Windows 10 For Free
- The Best Cheap Or Free Places To Get A Great Workout
- Mozilla Will Start Blocking Superfluous Flash Content
- Ask LH: Can Telstra Force Me Onto An NBN Plan If I Don't Want To Go?
- 10 Dropbox Tricks You Might Not Know About
There’s a shortage of IT professionals; there’s an even greater shortage of IT security professionals. Organisations are paying good money to find the right talent to protect their valuable IT assets and that’s motivating broader IT professionals to either skill up or outright move into the security space. But just because you have the technical know-how doesn’t mean you’ll be an effective security professional. So what makes a good IT security professional? Let’s find out.
High profile data breaches have pushed IT security up on the agenda of organisations. As a result, some companies have been overzealous in implementing a whole host of security solutions in the hopes of staving off attacks. But this is not an effective or efficient approach to IT security; You need to take the plunge and streamline your security product portfolio. Here’s where you can start.
If you find a cybercriminal has penetrated your organisation’s security defences and has entered the corporate network, don’t panic. Just because there’s an intrusion doesn’t mean that data has been stolen just yet. There may still time to stop attackers from getting away with any valuable information assets. Here’s why.
One of the surprisingly common questions I’m asked in my day job is “do I need to buy antivirus software for my phone or tablet?” The short answer is no — anti-virus software for sale in the Google Play store or the App Store are at best pointless, at worst, outright scams. But that’s not to say you shouldn’t take steps to protect the very personal information on your phone.
With billions of wireless devices shipped across the globe every year, it is safe to assume that most of us carry at least one wireless gadget with us most of the time. The number of wearables to be shipped this year alone is expected to exceed 100 million. Interestingly, one-third of wearables next year will be rather inconspicuous, with smart contact lenses and connected jewellery also hitting the market. These wireless devices leave digital footprints via leaked radio signals that can be used by police to track down thieves who steal these gadgets. Here’s how.
We hear about sophisticated attacks using ransomware and other viruses, but cybercriminals often use relatively low-tech social engineering methods to do their dirty work as well. Kasperky Lab discussed a rise in attackers targeting freelance workers by posing as a potential client and then tricking them into surrendering control of their mobile devices through legitimate remote access apps. Here’s what you need to know.
Adding to Lenovo’s security woes, another BIOS vulnerability has been found on the vendor’s PCs. According to an official statement from Lenovo, the flaw originates from one of its independent BIOS vendors and Intel so it’s likely other PC manufacturers are affected as well. Here’s what you need to know.
Every day, almost one million malware threats are introduced in the ceaseless jungle that is the internet. And yet, software developers, security experts, and IT administrators are expected to stay up-to-date with these latest threats to ensure that network environments and software applications are secured against them. Sure thing, you might think. I’ll get to today’s million malware threats right after I finish counting raindrops. We’re here to offer our assistance by going through a few of the most common malware threats that organisations face today.