Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe
The post 5 ways cybercriminals steal credit card details appeared first on WeLiveSecurity
Author: Phil Muncaster
Security Vendor News
Phishing awareness training: Help your employees avoid the hook
by Phil Muncaster •
Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders
The post Phishing awareness training: Help your employees avoid the hook appeared first on WeLiveSecurity
Security Vendor News
Cybersecurity awareness training: What is it and what works best?
by Phil Muncaster •
Give employees the knowledge needed to spot the warning signs of a cyberattack and to understand when they may be putting sensitive data at risk
The post Cybersecurity awareness training: What is it and what works best? appeared first on WeLiveSecurity
Security Vendor News
Opportunity out of crisis: Tapping the Great Resignation to close the cybersecurity skills gap
by Phil Muncaster •
What can organizations do to capitalize on the current fluidity in the job market and bring fresh cybersecurity talent into the fold?
The post Opportunity out of crisis: Tapping the Great Resignation to close the cybersecurity skills gap appeared first…
Security Vendor News
There’s no sugarcoating it: That online sugar daddy may be a scammer
by Phil Muncaster •
The bitter truth about how fraudsters dupe online daters in this new twist on romance fraud
The post There’s no sugarcoating it: That online sugar daddy may be a scammer appeared first on WeLiveSecurity
Security Vendor News
What’s behind the record‑high number of zero days?
by Phil Muncaster •
Organizations need to get better at mitigating threats from unknown vulnerabilities, especially as both state-backed operatives and financially-motivated cybercriminals are increasing their activity
The post What’s behind the record‑high number o…
Security Vendor News
The trouble with BEC: How to stop the costliest internet scam
by Phil Muncaster •
BEC fraud generated more losses for victims than any other type of cybercrime in 2021. It’s long past time that organizations got a handle on these scams.
The post The trouble with BEC: How to stop the costliest internet scam appeared first on WeLiveSe…
Security Vendor News
Webcam hacking: How to know if someone may be spying on you through your webcam
by Phil Muncaster •
Camfecting doesn’t ‘just’ invade your privacy – it could seriously impact your mental health and wellbeing. Here’s how to keep an eye on your laptop camera.
The post Webcam hacking: How to know if someone may be spying on you through your webcam appear…
Security Vendor News
How secure is your cloud storage? Mitigating data security risks in the cloud
by Phil Muncaster •
As cloud systems are increasingly the bedrock on which digital transformation is built, keeping a close eye on how they are secured is an essential cybersecurity best practice
The post How secure is your cloud storage? Mitigating data security risks in…
Security Vendor News
Defending the data center: The time to act is now
by Phil Muncaster •
Cyberattacks against data centers may ultimately be everyone’s problem – how prepared are their operators for the heightened risk of cyber-assaults?
The post Defending the data center: The time to act is now appeared first on WeLiveSecurity
Security Vendor News
Securing healthcare: An IT health check on the state of the sector
by Phil Muncaster •
No sector or organization is immune to rapidly escalating cyberthreats, but when it comes to healthcare, the stakes couldn’t be higher
The post Securing healthcare: An IT health check on the state of the sector appeared first on WeLiveSecurity
Security Vendor News
Teenage cybercrime: How to stop kids from taking the wrong path
by Phil Muncaster •
It’s never too late to prevent children from being dragged to the dark side and to ensure their skills are a force for good
The post Teenage cybercrime: How to stop kids from taking the wrong path appeared first on WeLiveSecurity
Security Vendor News
From the back office to the till: Cybersecurity challenges facing global retailers
by Phil Muncaster •
How well retailers can manage the surge in cyberthreats may be crucial for their prospects in a post‑pandemic world
The post From the back office to the till: Cybersecurity challenges facing global retailers appeared first on WeLiveSecurity
Security Vendor News
When love hurts: Watch out for romance scams this Valentine’s Day
by Phil Muncaster •
Don’t be the next victim – spot the signs of a faux romance in time and send that scammer ‘packing’
The post When love hurts: Watch out for romance scams this Valentine’s Day appeared first on WeLiveSecurity
Security Vendor News
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone
by Phil Muncaster •
Some fraudsters may use low-tech tactics to steal your sensitive information – peering over your shoulder as you enter that data is one of them
The post Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone appeared first on W…
Security Vendor News
Every breath you take, every move you make: Do fitness trackers pose privacy risks?
by Phil Muncaster •
Should you beware of wearables? Here’s what you should know about the potential security and privacy risks of your smartwatch or fitness tracker.
The post Every breath you take, every move you make: Do fitness trackers pose privacy risks? appeared firs…
Security Vendor News
How to know if your email has been hacked
by Phil Muncaster •
Think your email may have been hacked? Here are the signs to look for, how account takeover attacks commonly occur, and how to recover your account and avoid falling victim again
The post How to know if your email has been hacked appeared first on WeLi…
Security Vendor News
Making loyalty pay: How to keep your loyalty rewards safe from scammers
by Phil Muncaster •
Is loyalty fraud on your radar? Here’s why your hard-earned reward points and air miles may be easy pickings for cybercriminals.
The post Making loyalty pay: How to keep your loyalty rewards safe from scammers appeared first on WeLiveSecurity
Security Vendor News
Cryptocurrency scams: What to know and how to protect yourself
by Phil Muncaster •
As you attempt to strike it rich in the digital gold rush, make sure you know how to recognize various schemes that want to part you from your digital coins
The post Cryptocurrency scams: What to know and how to protect yourself appeared first on WeLi…
Security Vendor News
5 ways hackers steal passwords (and how to stop them)
by Phil Muncaster •
From social engineering to looking over your shoulder, here are some of the most common tricks that bad guys use to steal passwords
The post 5 ways hackers steal passwords (and how to stop them) appeared first on WeLiveSecurity
Security Vendor News
Breaking the habit: Top 10 bad cybersecurity habits to shed in 2022
by Phil Muncaster •
Be alert, be proactive and break these 10 bad habits to improve your cyber-hygiene in 2022
The post Breaking the habit: Top 10 bad cybersecurity habits to shed in 2022 appeared first on WeLiveSecurity
Security Vendor News
5 warning signs your identity has been stolen
by Phil Muncaster •
By spotting these early warning signs of identity theft, you can minimize the impact on you and your family
The post 5 warning signs your identity has been stolen appeared first on WeLiveSecurity
Security Vendor News
5 common gift card scams and how to spot them
by Phil Muncaster •
It often pays to look a gift horse in the mouth – recognizing these types of gift card fraud will go a long way toward helping you stay safe from this growing threat not just this holiday season
The post 5 common gift card scams and how to spot them ap…
Security Vendor News
What to do if you receive a data breach notice
by Phil Muncaster •
Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed
The post What to do if you receive a data breach notice appeared first on …
Security Vendor News
When the alarms go off: 10 key steps to take after a data breach
by Phil Muncaster •
It’s often said that data breaches are no longer a matter of ‘if’, but ‘when’ – here’s what your organization should do, and avoid doing, in the case of a security breach
The post When the alarms go off: 10 key steps to take after a data brea…
Security Vendor News
Passwordless authentication: Is your company ready to move beyond passwords?
by Phil Muncaster •
Are the days numbered for ‘123456’? As Microsoft further nudges the world away from passwords, here’s what your organization should consider before going password-free.
The post Passwordless authentication: Is your company ready to move beyond pas…
Security Vendor News
Putting cybersecurity first: Why secure‑by‑design must be the norm
by Phil Muncaster •
Organizations that aim to pull ahead of the competition need to develop a strong security culture from top to bottom
The post Putting cybersecurity first: Why secure‑by‑design must be the norm appeared first on WeLiveSecurity
Security Vendor News
What’s lurking in the shadows? How to manage the security risks of shadow IT
by Phil Muncaster •
Employee use of unsanctioned hardware and software is an increasingly acute problem in the remote and hybrid work era
The post What’s lurking in the shadows? How to manage the security risks of shadow IT appeared first on WeLiveSecurity
Security Vendor News
Employee offboarding: Why companies must close a crucial gap in their security strategy
by Phil Muncaster •
There are various ways a departing employee could put your organization at risk of a data breach. How do you offboard employees the right way and ensure your data remains safe?
The post Employee offboarding: Why companies must close a crucial gap in th…
Security Vendor News
Plugging the holes: How to prevent corporate data leaks in the cloud
by Phil Muncaster •
Misconfigurations of cloud resources can lead to various security incidents and ultimately cost your organization dearly. Here’s what you can do to prevent cloud configuration conundrums.
The post Plugging the holes: How to prevent corporate data leaks…
Security Vendor News
What is a cyberattack surface and how can you reduce it?
by Phil Muncaster •
Discover the best ways to mitigate your organization’s attack surface, in order to maximize cybersecurity.
The post What is a cyberattack surface and how can you reduce it? appeared first on WeLiveSecurity
Security Vendor News
Beyond the pandemic: Why are data breach costs at an all‑time high?
by Phil Muncaster •
It might be tempting to blame the record-high costs of data breaches on the COVID-19 pandemic alone. But dig deeper and a more nuanced picture emerges.
The post Beyond the pandemic: Why are data breach costs at an all‑time high? appeared first o…
Security Vendor News
Examining threats to device security in the hybrid workplace
by Phil Muncaster •
As employees split their time between office and off-site work, there’s a greater potential for company devices and data to fall into the wrong hands
The post Examining threats to device security in the hybrid workplace appeared first on WeLiveSecurity
Security Vendor News
Why cloud security is the key to unlocking value from hybrid working
by Phil Muncaster •
How can companies and employees who start to adapt to hybrid working practices protect themselves against cloud security threats?
The post Why cloud security is the key to unlocking value from hybrid working appeared first on WeLiveSecurity
Security Vendor News
Tackling the insider threat to the new hybrid workplace
by Phil Muncaster •
Now that organizations are set to evolve a hybrid blend of home and office-based work for most employees, it is more important then ever to address the risks that insider threat can pose
The post Tackling the insider threat to the new hybrid workplace …
Security Vendor News
Protecting the hybrid workplace through Zero Trust security
by Phil Muncaster •
The Zero Trust architecture offers an increasingly popular way to minimize cyber-risk in a world of hybrid cloud, flexible working and persistent threat actors.
The post Protecting the hybrid workplace through Zero Trust security appeared first on WeLi…
Security Vendor News
Choosing your MSP: What the Kaseya incident tells us about third‑party cyber‑risk
by Phil Muncaster •
Lessons to learn from the Kaseya cyberincident to protect your business’ data when doing business with a MSP.
The post Choosing your MSP: What the Kaseya incident tells us about third‑party cyber‑risk appeared first on WeLiveSecurity
Security Vendor News
The hybrid workplace: What does it mean for cybersecurity?
by Phil Muncaster •
How can organizations mitigate the risk of damaging cyberattacks while juggling the constantly changing mix of office and off-site workers?
The post The hybrid workplace: What does it mean for cybersecurity? appeared first on WeLiveSecurity