The new realities of communicating in the remote work environment have led to a whole new set of challenges. Initiatives related to protecting users on virtual meeting tools should be at the forefront of every government’s cybersecurity agenda.
How can you create a secure infrastructure for the sensitive data being managed by your enterprise? Encryption key management is more important than ever.
Ransomware penetrates an organization’s IT infrastructure through phishing emails or endpoint vulnerabilities and then encrypts files, holding data hostage until a fee is paid to decrypt them. The FBI has deemed ransomware the fastest growing malware threat, causing significant revenue loss, business downtime and reputational damage. It’s critical organizations protect their data by following the best practices.
Google has announced it will be releasing a new Virtual Private Network (VPN), which will be directly embedded in Google One services. Cybersecurity experts, however, think the service leaves much to be desired.
Check Point Research unraveled an ongoing surveillance operation by Iranian entities that has been targeting Iranian expats and dissidents for years. While some individual sightings of this attack were previously reported by other researchers and journalists, the investigation allowed Check Point to connect the different campaigns and attribute them to the same attackers.
The Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2020 (EARN IT), aimed at protecting children from online predators, is facing scrutiny from those who believe it will undermine privacy, promote censorship and jeopardize the right to free speech.