Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

The campaign started with a trojanized version of unsupported financial software. The compromise of the 3CX communication software made history as the first-ever publicly documented incident of one supply-chain attack leading to another. Two critical infrastructure organizations in the energy sector and two organizations in the financial sector are among the confirmed victims.  A supply-chain attack attempts to evade cybersecurity … More Recovering from a supply-chain attack: What are the lessons to learn from the 3CX hack?

Passwords out, passkeys in: are you ready to make the switch?

With passkeys poised for prime time, passwords seem passé. What are the main benefits of ditching one in favor of the other? Chances are good that many of us have had enough of passwords. In a world where we have to manage access for scores of online accounts, passwords no longer seem fit for purpose. Many … More Passwords out, passkeys in: are you ready to make the switch?

Creating strong, yet user‑friendly passwords: Tips for your business password policy

Don’t torture people with exceedingly complex password composition rules but do blacklist commonly used passwords, plus other ways to help people help themselves – and your entire organization. When engineer Bill Burr from the U.S. National Institute of Standards and Technology (NIST) wrote in 2003 what would soon become the world’s gold standard for password security, … More Creating strong, yet user‑friendly passwords: Tips for your business password policy

Cleaning up your social media and passwords: What to trash and what to treasure

Give your social media presence a good spring scrubbing, audit your passwords and other easy ways to bring order to your digital chaos. Spring has sprung, the sun is out longer, and the birds’ chirping, peeping and tweeting in the trees have put that much-needed pep in your step. With the arrival of spring also … More Cleaning up your social media and passwords: What to trash and what to treasure

10 common security mistakes and how to avoid them

Do you make these security mistakes and put yourself at greater risk for successful attacks? How much of your personal time do you spend online? The answer may be a lot more than you think. One recent study estimated that Brits spend five hours on average each day glued to their screens, not including work time. It … More 10 common security mistakes and how to avoid them