News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

IoT devices: how do you stay safe in the home office?
SophosNews

For many employees, home office is no longer just prescribed, but also desired. Using your own PC safely for yourself and your company is already practiced and routine. But many users have several IoT devices in use at home. Therefore, as part of the European Cyber ​​Security Month ECSM, Sophos provides a few basic rules for securely organizing and managing the turmoil in your own network. Seven questions should be asked about devices in and about the general network settings when dealing with the subject of IT security in ...

Read more

Study: Employees want more home office
Home office solution study

According to the new study by MobileIron, the future of work is the “Everywhere-Enterprise”. According to surveys, over 80% of employees worldwide want to work more from home and not work full-time in the office again. However: The security of mobile devices, apps and users must be a top priority for every CIO, as their employees work mobile in the new Everywhere Enterprise. MobileIron, the mobile-centric security platform for the Everywhere Enterprise, today announced the results of its new study: Over 80% of employees worldwide do not want to return to their office full-time, even though one in three (30%) employees need isolation ...

Read more

Enemies in the home office
Home office danger security

In the area of ​​IT security and home office, the burdens are not distributed in favor of the companies: While they have to permanently take all security measures appropriate to the threat situation across their entire IT landscape, attackers can use a small weak point to cause massive damage. Unsecured end devices in the company or in the home office, cloud and IaaS applications, poorly secured networks or surfing the World Wide Web open up numerous opportunities for hackers to infiltrate companies and steal data. Since the latter can be easily turned into money, cyber criminals have a correspondingly high level of motivation to refine their attack techniques and ...

Read more

3,4 million RDP attacks per day
Network remote attack

Hackers attack home offices every day with millions of RDP attacks. Companies underestimate the risk of poorly secured remote access. ESET's security experts are sounding the alarm. Since the corona-related move to the home office, the number of daily hacker attacks on remote desktop connections (RDP) in the DACH region has increased more than tenfold. In June 2020 alone, the IT security manufacturer recorded up to 3,4 million attacks within 24 hours on the digital lifeline between companies and remote employees. The attackers are concerned with both accessing data and distributing ransomware. 35 ... per second

Read more

Employees overestimate knowledge
Way guidance training

Home office and IT security: employees make 90 percent of mistakes because they are convinced that they are doing the right thing. Kaspersky training clearly shows that employees time and again overestimate their own knowledge. The free security training from Kaspersky and Area 9 Lyceum shows that employees overestimate their knowledge of IT security: although correct answers were given in two thirds of cases (66 percent), nine out of ten cases received the answer was wrong, but the employees are still convinced of their knowledge. The use of virtual machines, software updates and the reasons ...

Read more

Zcaler: Dangerous return from home office devices
B2B Cyber ​​Security ShortNews

The change of many employees to the home office at the beginning of the "Corona" contact restrictions was often hasty. Nicolas Casimir, "EMEA CISO" at Zscaler, warns that there is now a risk that devices infected with malicious code could compromise the security of the network when they return to the company. Employees could bring logic bombs into the company Casimir explains: “In IT security, a 'logic bomb' is malicious code that is smuggled into software or a system and whose function is only triggered if certain conditions are met. These 'time bombs' are used by viruses, worms, Trojans ...

Read more

Fake emails to employees
Kaspersky_news

Home office workers are often the weakest link in the chain of defense. Companies should therefore make their employees aware that cyber criminals are sending fake emails (phishing emails) on behalf of the company. Employees should be lured into traps, as Kaspersky was able to observe. Corona has severely affected the economy in many countries, including Germany; many companies introduced short-time working, laid off employees or adjusted existing regulations on vacation, illness or parental leave. Cyber ​​criminals around the world are taking advantage of this fact and are spreading phishing emails geared towards them, as current Kaspersky investigations of the second quarter show: The Kaspersky experts ...

Read more

uniscon: Home office user support
Uniscon idgard Tüv south

TÜV SÜD subsidiary uniscon relies on digital user lane assistants and thus enables user support in the home office. Companies have to rethink: According to a survey by Gartner, the majority of executives would like to enable their employees to work remotely in the future. This poses several challenges for companies and organizations at the same time. Because the digital home office not only needs services and infrastructures that meet the high security requirements of companies and that work via the web. The help and support channels also have to adapt to the new everyday conditions of the users. Flexible working hours require flexible support "Many cloud services offer ...

Read more