All You Need to Know About DNS Spoofing to Keep Your Organization Safe

This post is also available in: Danish The DNS in and of itself has never been secure. Being created in the 1980s when the Internet was a complete novelty, protection…

Security, remote work support top concerns amongst firms

Increasing adoption of hybrid work practices has pushed the need to enable and secure remote workers as a top challenge for IT managers. Security threats also have evolved amidst this…

Olympus Cyberattack Happening During the Weekend

Cyberattacks seem to have no end. A new one targeted Olympus, a firm that specializes in medical technology, over the weekend, on Sunday, October 10. Following this Olympus cyberattack, the…

Vulnerable Video DVR Devices Now Targeted by the FreakOut Botnet

FreakOut botnet (aka Necro, N3Cr0m0rPh) creators have updated the malware and added a PoC exploit for Visual Tools DVR, an electronic video recorder utilized in surveillance video systems, capable of supporting up…

Intune vs. WSUS vs. SCCM – Costs, Benefits, Ease of Use, and Deployment

Patching has certainly gained a lot of momentum ever since research has proven that ‘unattended’ apps and software can quickly lead to a data leak.  Patching is the new ‘kid’…

Patching Too Tortuous for IT Pros

Patching Too Tortuous for IT Pros Patching vulnerabilities is too labor intensive and convoluted a process for most IT security professionals, according to new research by Ivanti.  The Utah-based software company surveyed over…

Why healthcare IoT requires stronger healthcare cybersecurity

The healthcare industry has gone through a dramatic technological transformation, one that has been accelerated by COVID. Internet-connected devices (collectively known as the Internet of Things, or IoT devices), once…

Top 5 Healthcare Cyber Attacks and Threats

Even before the novel coronavirus pandemic, which forced healthcare organizations to shift to provide patients remote care and telemedicine rapidly, the healthcare industry had already embraced the cloud, as well…

What Is a Data Breach and How to Prevent It

A data breach occurs when an unauthorized individual gains access to confidential, sensitive, or protected information. Without permission, files from a data breach are viewed and/or shared. Phases of a…

Small and Mid-Sized Businesses Need to be Prepared for Ransomware Attacks

Ransomware attacks are currently one of the fastest-growing cyber security threats affecting small to mid-sized businesses (SMBs). These incidents can hit organizations of all sizes within virtually every industry. Bitdefender’s…