Cybersecurity Awareness Question of the Week: Login Credentials
Who should you share with or reveal your login credentials to?
Read moreWho should you share with or reveal your login credentials to?
Read moreWhen selling a used device online, which of the following is the most important?
Read moreWhen selling a used device online, which of the following is the most important?
Read moreIf you look at books and publications on cybersecurity, it’s clear that we continue to emphasize common information security best practices: Keep up with patches, disable unnecessary services, have users work with limited privilege, follow system hardening principles, and maintain an ongoing program of user education. Depending on the industry, there are guidelines, standards, or even federal regulations that drive cybersecurity. Unfortunately, as shown by Heartland Payment Systems and Target Stores, these standards are often viewed as encompassing security solutions, rather than baseline, minimal requirements.
Read more