Getting the employee experience right (Citrix)
While some companies were immediately successful with remote work, many felt their systems were stressed as they tried to deliver remotely what employees were used to in the office.
Special Delivery: Don’t Fall for the USPS SMiShing Scam (McAfee)
Hackers are all too familiar with our reliance on our smartphones – and are eager to exploit them with stealthy tricks as a result.
Running Sensitive Apps in WSL: (SAFE + SAFE) < SAFE (CyberArk)
Running sensitive applications inside WSL is significantly less secure than running the equivalent applications in a standalone Windows or Linux Desktop system
Windows 7 ‘Upgrade’ Emails Steal Outlook Credentials
An ongoing phishing attack puts pressure on enterprise employees to upgrade their Windows 7 systems – but in reality, they are redirected to a fake Outlook login page that steals their credentials.
Cloud Security: 12 Myths vs Facts (Check Point)
As cloud technology expands in both worldwide use and the complexity of offerings, some myths persist. At Check Point, we put our heads together and created the following list of the most common cloud security myths, followed by the conflicting realities.
This worm phishing campaign is a game-changer in password theft, account takeovers
The campaign was "ingenious" but the bot was "too effective" and its eagerness to propagate set up red flags and alerts too quickly to reach its full potential.
CISA Releases Telework Essentials Toolkit
The Cybersecurity and Infrastructure Security Agency (CISA) has released the Telework Essentials Toolkit, a comprehensive resource of telework best practices. The Toolkit provides three personalized modules for executive leaders, IT professionals, and teleworkers.
Detecting Microsoft 365 and Azure Active Directory Backdoors (FireEye)
Mandiant has seen an uptick in incidents involving Microsoft 365 (M365) and Azure Active Directory (Azure AD). Most of these incidents are the result of a phishing email coercing a user to enter their credentials used for accessing M365 into a phishing site. Other incidents have been a result of password spraying, password stuffing, or simple brute force attempts against M365 tenants.
It’s Time to Get Cloud Smart about Application Security (F5)
Organizations need solutions that bolster their security postures and help them comply with Cloud Smart’s call for “confidentiality, integrity, and availability of Federal information as it traverses networks and rests within systems, regardless of whether those environments are managed locally, off-premises, by a Government entity, or by a contractor.”
National Cybersecurity Awareness Month (NCSAM)
Now in its 17th year, National Cybersecurity Awareness Month (NCSAM) continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online.
Citrix Recognized by AWS for Digital Workplace Expertise
Citrix today announced that it has achieved Amazon Web Services (AWS) Digital Workplace Competency status, a testament of its relationship with AWS and a demonstration of its deep experience helping customers build a digital workplace on AWS that frees end users from traditional work hubs and allows them to work securely on virtually any device, from any location, at any time.