Cybercriminals Targeting Unpatched Vulnerabilities

Despite months of dire warnings about the threat potential, researchers say the vast majority of vulnerabilities in the widely used Apache Log4j logging utility for Java software remain unpatched and actively exploited. New research suggests that more than 90,000 Internet-facing Java applications and nearly 70,000 servers remain exposed to the flaw that enables attackers to remotely execute code on compromised systems.

The Surprising Risks of Unsecured Printers and Multifunction Devices

The international hacktivist group Anonymous recently claimed it hacked hundreds of unsecured printers throughout Russia, using them to distribute anti-war messages. Despite their good intentions, the incident is just another reminder that printers, fax machines and multifunction devices are far more vulnerable to malicious exploits than most people realize.

IoT Attacks on the Rise. Are You Prepared?

Billions of Internet of Things (IoT) devices are being compromised each year as malicious actors exploit a variety of security gaps to organize botnets, steal data and mine cryptocurrency. While the IoT now represents the single largest attack surface for most organizations, few have taken steps to adequately secure their IoT environment.

How Private Is Your Email?

There’s a lot to like about email. It’s fast, cheap, easy and reliable. With the touch of a button, you can simultaneously send messages or documents to dozens of contacts located just about anywhere on the planet. You can also use it to sort, file and filter important personal and professional information.

3 Requirements for Secure Online File Sharing

File-sharing technologies are essential for the efficient exchange of information in the digital age. However, a recently resolved class-action lawsuit against the provider of a well-known file-sharing service illustrates the risks these solutions can introduce.

An Integrated Approach to Comprehensive Data Protection

Safeguarding data against loss, theft or corruption has always been one of the most critical functions of IT organizations. However, the process has become far more complex over the past several years. With the continued transition to cloud, mobile and remote working, the days of simply establishing a secure perimeter around a single, monolithic data repository are long gone.

Just released our free eBook, 20 Signs That Your Business is Ready for Managed ServicesDownload