Cyber Security Tips for Business — Business Internet Security
Our expert bloggers will reveal their findings and offer tips on how to maximize your online security so you can focus on what’s most important – your business.
Futher to my last post about social engineering in the IoT; here are a couple of attack scenarios that we might easily see emerge. Attack scenario 1: Reflected targeting and compromise Things are often too limited in processing and memory to compromise and manipulate to large effect. What is more, they might not have information […]
Successful social engineering attacks through IoT systems could lead to a perception of being surrounded by hostile devices, and greatly retard development; making the consequences of social engineering attacks in the IoT very significant. Social engineering attacks will certainly evolve into the Internet of Things (IoT), if they have not already. These attacks have the […]
With its inherent characteristics to significantly reduce costs, free ‘open source’ software (OSS) is growing in popularity with SMEs and start-ups. Free services to replace Microsoft Word and software to manage finances are fast becoming attractive money saving alternatives for SMEs and start-ups. Not only are these OSS products typically free to use, they also […]
Hello, all! Brandie, here – As head of corporate communications at Intel Security I lead an amazing team of professional communicators. This resourceful group handles public relations, internal and executive communications, analyst relations, and government affairs. It’s a compelling mix of important work across sales and marketing, the media, national and international regulation, and brand. […]
The parade of breaches, attacks and various other digital maladies hitting corporations in 2014 made it clear that default, out-of-the-box compliance and security isn’t enough to protect organizations. But the nature of advanced persistent threats (APTs), and other forms of malware, makes it difficult to find an investment that can keep the next threat from […]