Archive for 57828255

THE MOST OVERLOOKED CYBERSECURITY DEFENSE TACTICS

https://www.darkreading.com/vulnerabilities—threats/doh!!!–the-10-most-overlooked-security-tasks/d/d-id/1330820

CYBER DEFENSE IS EVERYONE’S RESPONSIBILITY

https://www.csoonline.com/article/3248824/data-protection/who-should-be-responsible-for-cybersecurity.html

Does the FTC have to impose larger fines to get companies to improve their cybersecurity?

https://spectrum.ieee.org/riskfactor/computing/it/will-us-corporations-ever-take-cybersecurity-seriously

Facebook Allowed Political Ads That Were Actually Scams and Malware

Traditionally, Facebook has been reluctant to review ads before they show up on its platform. From CNBC:

https://www.cnbc.com/2017/12/05/facebook-political-ads-were-actually-scams-and-malware.html

EUROPOL Study Shows Increases in Ransomware, Data Breaches, Payment Fraud

https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2017

The Internet Organized Crime Threat Assessment (IOCTA) 2017 Report Now Available

Click here to download:

https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2017

CyberSecurity Ventures Predicts That Cybercrime Damages Will Cost the World $6 Trillion by 2021

The frequency and cost of cyber crime attacks continues to grow rapidly:

https://www.herjavecgroup.com/cybercrime-report-2017/

Cyber Threat Intelligence: Many sources of information available for free or at low cost

Saw this article in “Dark Reading”:

https://www.darkreading.com/threat-intelligence/8-low-or-no-cost-sources-of-threat-intelligence——-/d/d-id/1330447?image_number=1

Beware of Downloading Infected Apps at Sports Events

It’s all too easy to get caught up in the enthusiasm of a sporting event but beware of downloading an infected app while you’re there!

Please see attached white paper from Allot CommunicationsRP_MobileTrends_Euro_2016_LR_Publish

The IIoT challenge: Cellular vs. Low Power WAN

Essentially, the choice of cellular vs. LPWAN network access for IIoT boils down to four key considerations:
1. Access to cell coverage
2. The need for localized intelligence
3. The number of sensor points being managed
4. Cost

Please see more detail in the attached article by Jay Kilby in IoTNow:

http://www.iot-now.com/2016/06/10/48363-cellular-or-low-power-wan-choosing-the-right-approach-for-your-iiot-deployment/