As bring your own device (BYOD) policies become common practice for companies today, business owners must keep in mind the possible cybersecurity implications of connecting more devices to the company network. If your employees are using Android devices, here are the top five security threats they need to be aware of as well as how to steer clear from them.
Android mobile security threats today
What hyperconvergence means for SMBs
Progressive SMBs are defined by how they use technology to achieve business growth. From acquiring new customers to managing suppliers to exceeding sales quotas, IT helps a lot. But traditional hardware and software solutions are expensive to purchase and support.
Tips to reduce risks after a security breach
No company is completely safe from data breaches. For proof, look no further than companies like Yahoo, AOL, and Home Depot, which compromised millions of personal customer information. That said, no business is completely helpless, either. The following steps can minimize the risks to your business in the event of a large-scale data breach.
Healthcare: Prevent insider threats
Healthcare is the only industry where insider threats pose the greatest threat to sensitive data, with 58 percent of security incidents coming from people working within the organization itself. Here’s a look at five ways to prevent such breaches.
#1 Educate - The workforce (meaning all healthcare employees) must be educated on allowable uses and disclosures of protected health information (PHI) and the risk associated with certain behaviors, patient privacy, and data security.
iPhone security impenetrable no more
Cellebrite claims that they have devised “undisclosed techniques” to unlock Apple devices running on any iOS operating system. The U.S. government contractor based in Israel recently notified clients of their ability to circumnavigate iOS protections that’s part of their new service for forensic specialists and law enforcement.
Virtual DR: The best anti-ransomware tool
From CryptoLocker to WannaCry, ransomware has grown in sophistication and scope over the past few years. And given its widespread success with hackers, more ransomware attacks will likely be developed further into 2018. In anticipation of these attacks, many experts are saying that virtualized disaster recovery solutions may be the best way to defend against future ransomware.
It’s not too late to cash in on 2017’s IT trends
“Fad” is a dirty word for many small-business owners. Whether it’s what they’re selling or what they’re investing in, business owners need long-term and reliable investments to secure their future. With 2017 in the rearview mirror, we finally know what was a fad and what was a smart investment.
Cyber weapons for sale by dangerous hackers
“Script kiddies” are a type of computer hacker that copies malware programs from more experienced creators and put their own name on it. WannaCry was programmed by script kiddies, and the group they stole the malware from is selling a new set of vulnerabilities.
Ransomware targets Android devices
By now, most people know what ransomware is: malicious software that threatens to publish or erase its victims' data unless they pay a ransom. But with the surge in mobile device computing, it was inevitable that ransomware would adapt to find new victims.
Malware targeting MacOS steals bank logins
Although ransomware has stolen the limelight recently, there’s another type of cyberattack targeting your bank account. Thanks to some horrifying ingenuity, being infected by OSX.Dok can result in victims directly handing their bank account information to hackers.