What other hotels can learn from Marriott security breach

Last Friday, Marriott sent out millions of emails warning of a massive data breach — some 500 million guest reservations had been stolen from its Starwood database. One problem: the email sender’s domain didn’t look like it came from Marriott at all. Marriott sent its notification email from “email-marriott.com,” which is registered to a third […]

Read more

Cybersecurity Needs to be Closely Linked to IT Modernization

There’s a direct link between the amount of legacy applications and IT infrastructure any organization has installed and an organization’s overall security posture. The longer applications and IT infrastructure have been deployed the more likely it is that cybercriminals are exploiting some vulnerability. It’s even probable that vulnerability is a known exploit. The patch for […]

Read more

Cybersecurity Professionals Need to Adjust to a New Reality

While most cybersecurity professionals continue to profess they are moderately to highly confident in the overall security posture of their organization growing concerns about phishing and ransomware attacks appears to be taking its toll. Most cybersecurity professionals these days are becoming increasingly conflicted. Confidence in cybersecurity defenses is relatively high. The issue is that phishing […]

Read more

IoT Cybersecurity Improvement Act Shows Promise

The Internet of Things (IoT) Cybersecurity Improvement Act of 2017 sponsored by U.S. Senators Cory Gardner (R-CO) and Mark R. Warner (D-VA), co-chairs of the Senate Cybersecurity Caucus, and Sens. Ron Wyden (D-WA) and Steve Daines (R-MT) would require government agencies deploying an IoT solution to ensure devices are patchable, make use of industry standard […]

Read more

Don’t Fall Victim to Ransomware

We’ve talked before about using proper data protection strategies to protect yourself from ransomware. This is important, because if there’s no free online decryptor for your files, you will want to be able to restore them from backup so that you don’t have to pay the criminal. Still, the best thing you can do is […]

Read more

Turns Out Incident Response Is Way More than Half the IT Security Battle

In many case it’s turning out that the only thing uglier than the malware organizations are being plagued with may very well be the way they respond to those attacks. Two separate studies published this week suggest there’s a lot of room for improvement in terms of how organizations go about investigating and responding to […]

Read more

Are you Cloud Ready?

Most IT organizations are trying to determine how their traditional on-premises infrastructure will work when they start leveraging cloud resources. Even those already leveraging cloud may have confusion over what to put where, what works best in what environment, and what may need to be kept on-premises. Security remains a top concern. Barracuda is a […]

Read more

Changes Cybersecurity Defense Stances to Impact Businesses of All Sizes

A new Global Security Index report this week published by the United Nations underscores how seriously governments are starting to take the cyber security threat. The report finds that 38% of the 192 countries that are members of the International Telecommunications Union (ITU) that operates under the auspices of the UN have published a formal […]

Read more

NotPetya – What you have to know

At first, the new malware flare-up was seen to have a significant number of similar attributes of the Petya ransomware from a year ago as it revamps the ace boot record of the PC with a payment note guaranteeing that the circle has been scrambled and giving directions on the most proficient method to pay […]

Read more

Ransomware and K-12 – Threats and Solutions

In a ransomware attack, the malware encrypts your data and demands a ransom in order to restore your access to the locked files. This is big business. Here are the simple yet powerful points you have to remember and follow: Don’t open suspicious emails. Pretty much anything unexpected or out of the ordinary is a […]

Read more