![vault](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112257/vault-400x200.jpg)
5 easy steps to immediately bolster cybersecurity during the pandemic
Cyber attacks have increased exponentially since the start of the pandemic, with AT&T Alien Labs Open Threat Exchange (OTX) finding 419,643 indicators of compromise (IOC) …
![open source](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13113507/opensource-blue-400x200.jpg)
Eye-opening statistics about open source security, license compliance, and code quality risk
99% of commercial codebases contain at least one open source component, with open source comprising 70% of the code overall, according to Synopsys. Open source components and …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13131647/lock-data-400x200.jpg)
COVID-19 has contributed to record breaking cybercriminal activity
There has been an exponential growth in phishing and website scams in Q1 2020, according to a Bolster analysis of over 1 billion websites. 854,441 confirmed phishing and …
![turn off](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/13130427/off_servers-400x200.jpg)
Unexpected downtime is crippling businesses, causing revenue losses
Unexpected downtime is a major challenge for SMBs today. The IT systems of nearly a quarter of SMBs have gone offline in the past year, according to a research from …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
Have you patched these top 10 routinely exploited vulnerabilities?
The US Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations to patch a slew of old and new software vulnerabilities that are routinely exploited by …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
How to implement least privilege in the cloud
According to a recent survey of 241 industry experts conducted by the Cloud Security Alliance (CSA), misconfiguration of cloud resources is a leading cause of data breaches. …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101057/healthcare-400x200.jpg)
New third-party healthcare data rules: Increased access alongside privacy considerations
It would be an understatement to say that 2020 is a monumental year for healthcare. The COVID-19 pandemic brought many aspects of care to the forefront – from technology and …
![industry](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102823/industry-400x200.jpeg)
Advanced attack scenarios and sabotage of smart manufacturing environments
Advanced hackers could leverage unconventional, new attack vectors to sabotage smart manufacturing environments, according to Trend Micro. Industry 4.0 Lab, the system that …
![Business ideas](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195343/compliance-400x200.jpg)
Cybersecurity and compliance: Vital priorities for MSPs and their clients
Cybersecurity and, to a lesser but growing extent, compliance are the most pressing priorities for MSPs and their customers this year, according to a Kaseya survey of 1,300 …
![mobile device](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111757/mobile-400x200.jpg)
Global remote work transitions fail to consider security gaps
Security measures and password best practices have not taken priority in many regions during the shift to remote work due to the COVID-19 pandemic, according to a survey by …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/12201844/patch-mirror2-400x200.jpg)
May 2020 Patch Tuesday: Microsoft fixes 111 flaws, Adobe 36
For the May 2020 Patch Tuesday, Microsoft has fixed 111 CVE-numbered flaws and Adobe 36, but none are under active attack. Microsoft’s updates For the third time in the …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2020/03/15085724/person-ray-400x200.jpg)
Why a single online name and social cards will be the new norm
Each day, online users provide companies, organizations, and other individuals with vital personal information without much thought. As social networks and brands began to use …