Enterprise incident response: getting ahead of the wave

As with traditional warfare, beating back attacks and winning depends on having a plan. Here are several incident respond models security researchers have developed for responding to threats.

Categories:

Tags:

(Read more…)

The post Enterprise incident response: getting ahead of the wave appeared first on Malwarebytes Labs.

Malware targeting industrial plants: a threat to physical security

When malware shuts down the computer systems of an industrial plant, it could threaten the physical security of those working in or living near it. Here’s how to protect your workforce and your business from targeted threats.

Categories:

Tags:

(Read more…)

The post Malware targeting industrial plants: a threat to physical security appeared first on Malwarebytes Labs.

Who is managing the security of medical management apps?

Because medical records are such a lucrative data set, attackers often target the healthcare industry, seeking out and eventually finding the weakest link in the supply chain. That’s why it’s important for stakeholders to consider the broader implications of cybersecurity weaknesses in medical management apps. But who should be held responsible?

Categories:

Tags:

(Read more…)

The post Who is managing the security of medical management apps? appeared first on Malwarebytes Labs.

Compromising vital infrastructure: water management

Water management is an essential part of our infrastructure. Loss of it can lead to service outages, diseases, and famine. So the cybersecurity should be top notch.

Categories:

Tags:

(Read more…)

The post Compromising vital infrastructure: water management appeared first on Malwarebytes Labs.

Facebook’s history betrays its privacy pivot

Facebook’s self-proclaimed pivot to privacy faces a fierce opponent—Facebook’s own history.

Categories:

Tags:

(Read more…)

The post Facebook’s history betrays its privacy pivot appeared first on Malwarebytes Labs.

New research finds hospitals are easy targets for phishing attacks

New research from Brigham and Women’s Hospital in Boston finds hospital employees are extremely vulnerable to phishing attacks. The study highlights just how effective phishing remains as a tactic, and why awareness of email scams is more critical than ever.

Categories:

Tags:

(Read more…)

The post New research finds hospitals are easy targets for phishing attacks appeared first on Malwarebytes Labs.

Reputation management in the age of cyberattacks against businesses

A business’s reputation takes years to build. With the current climate of data breaches, destroying it can take only seconds. What can businesses do to protect their brands from fallout following a cybersecurity incident? We answer these questions and more.

Categories:

Tags:

(Read more…)

The post Reputation management in the age of cyberattacks against businesses appeared first on Malwarebytes Labs.

Key considerations for building vs. buying identity access management solutions

Having a strong identity and access management solution is critical to the security of your organization. It ensures that the right people have access to your system—and keeps unauthorized users out. Should businesses build these solutions in-house or look to third-party vendors to fill the gap? Here are the factors to consider.

Categories:

Tags:

(Read more…)

The post Key considerations for building vs. buying identity access management solutions appeared first on Malwarebytes Labs.

What K–12 schools need to shore up cybersecurity

We discuss the challenges facing K–12 schools looking to protect students’ data, and which solutions they can adopt in order to build up defenses and increase cybersecurity awareness.

Categories:

Tags:

(Read more…)

The post What K–12 schools need to shore up cybersecurity appeared first on Malwarebytes Labs.

Max Schrems: lawyer, regulator, international man of privacy

Almost 10 years ago, privacy advocate Max Schrems and the European Union began separate efforts to change the way the world thinks about online privacy. Thanks to them, we now have GDPR.

Categories:

Tags:

(Read more…)

The post Max Schrems: lawyer, regulator, international man of privacy appeared first on Malwarebytes Labs.