The news is regularly filled with headlines of another big breach. For example, recently millions of customers at Saks and Lord & Taylor stores were affected by a breach. While it is still under investigation, initial reports point to it being the result of a phishing attack. It’s not surprising that hackers use this approach […]

Read More – Four Key Elements Of An Anti-Phishing Program





Source link



Microsoft recently released an out of cycle update to fix a critical flaw in the Microsoft Malware Protection Engine (MMPE). Due to a vulnerability in an open source archive package, a Google research found that by sending a maliciously crafted file to a computer running MMPE, you can exploit this flaw to execute code and […]

Read More – Microsoft MMPE Vulnerable – Daily Security Byte





Source link



As more small and medium-sized businesses (SMBs) turn to their value-added resellers (VARs) and managed service providers (MSPs) for solutions to their security needs, these partners have responded by expanding their security services for smaller customers. This means more customers, more chaos and increased pressure to do more work with the same resources. In response, […]

Read More – The Top Tools MSSPs Want From Their Vendors





Source link



Last week, a leaked memo from Boeing management informed the world that the top airplane manufacturer had gotten infected by the old WannaCry ransomworm. Since then, Boeing has downplayed the attack, saying it didn’t affect production and is under control. Nonetheless, information security pundits wonder how such a large enterprise, which should have the best […]

Read More – Learning From Boeing’s Infection – Daily Security Byte





Source link

Cloud Utilization and Security



Cloud computing

With total market capital up in the billions of dollars, it’s a no-brainer that companies want to participate in the exponential growth of cloud computing. Highlights for cloud computing include: Access is convenient – most people have Internet access nowadays, this is not to say that some don’t have access but the Internet is widely […]

Read More – Cloud Utilization and Security





Source link



If you’re flown recently, and checked in with a mobile app, you probably know what a QR code is—the digital looking square graphic used to represent some specific data. These digital codes replace the UPC bar codes from yesteryear (or really, yester-decade?). In any case, most mobile devices now come with built in QR code […]

Read More – Shady iOS QR Codes – Daily Security Byte





Source link



WatchGuard is proud to announce that it has been awarded a five-star ranking in CRN’s Partner Program Guide once again this year! CRN produces this annual list to serve as the definitive guide of partner programs from technology vendors providing products and services through the IT channel. WatchGuard is thrilled to be recognized again as […]

Read More – WatchGuard Earns 5-Star Rating in CRN’s 2018 Partner Program Guide





Source link