![credit card](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094629/creditcard-400x200.jpg)
Banks continue to prioritize risk management over customer convenience
Almost three in four banks in Asia Pacific anticipate that fraud in their country will increase in 2019, according to a recent poll by FICO. Of specific concern are …
![Outlook](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094623/outlook-400x200.jpg)
Hackers used credentials of a Microsoft Support worker to access users’ webmail
On Friday, an unknown number of customers of Microsoft’s webmail services (Outlook.com, Hotmail, MSN Mail) received a notice from the company telling them that attackers …
![smartphone isolation](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101952/smartphone-isolation-400x200.jpg)
Employee cybersecurity essentials part 2: Lost devices and unsafe connections
Security is only as strong as its weakest link, and as we have seen, that includes your employees. Faulting workers for behavior they’ve become accustomed to in their private …
![risk](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112759/risk-400x200.jpg)
Bad security hygiene still a major risk for enterprise IT networks
Unpatched vulnerabilities, along with growing network and application complexity pose an ongoing security risk which could threaten the security of enterprise IT networks. …
![gears](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113120/gears-400x200.jpg)
As IT security automation increases, so does the need for highly skilled staff
The adoption of automation for IT security functions is on the rise across the US, UK and APAC, the latest DomainTools/Ponemon report has shown. The report, which is based on …
![cloud storage](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102525/cloud_storage-400x200.jpg)
What is driving organizations’ cloud adoption?
Cloud adoption is gaining momentum, as 36 percent of organizations are currently in the process of migrating to the cloud while close to 20 percent consider themselves to be …
![G Suite](https://img.helpnetsecurity.com/wp-content/uploads/2018/01/09102108/gsuite-400x200.jpg)
Google introduces many G Suite security enhancements
Last week, the big news from Google Cloud Next 2019 was that phones running Android 7.0 or higher can be turned into a security key for G Suite account 2-step verification. …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100112/healthcare-400x200.jpg)
Healthcare orgs have to achieve true cybersecurity, not only compliance
How many organizations in the healthcare sector are conforming with the HIPAA Security and Privacy Rules and the National Institute of Standards and Technology Cybersecurity …
![face](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100127/face-400x200.jpg)
Manufacturing sector most vulnerable to insider threats
Almost three quarters of the 650+ international IT professionals Gurucul canvassed said they are vulnerable to insider threats, and ranked user error (39%) and malicious …
![Headache](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195350/headache-400x200.jpg)
The top emerging risks organizations are facing
Gartner surveyed 98 senior executives across industries and geographies and found that “accelerating privacy regulation” had overtaken “talent shortages” as the top emerging …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103054/ddos-400x200.jpg)
The correlation between DDoS attacks and cryptomining
There is a direct correlation between cryptocurrency and DDoS attacks. As the price of cryptocurrency dropped in 2018, leading to decreased profits from cryptomining, hackers …
![abstract](https://img.helpnetsecurity.com/wp-content/uploads/2016/03/09113858/abstract-400x200.jpg)
Week in review: Password-less security, WPA3 design flaws, new Windows 10 update controls
Here’s an overview of some of last week’s most interesting news and articles: Magento sites under attack through easily exploitable SQLi flaw A recently patched SQL injection …
Featured news
Resources
Don't miss
- Attackers compromise IIS servers by leveraging exposed ASP.NET machine keys
- Self-sovereign identity could transform fraud prevention, but…
- Ghidra 11.3 released: New features, performance improvements, bug fixes
- Ransomware payments plummet as more victims refuse to pay
- The overlooked risks of poor data hygiene in AI-driven organizations