COVID-19

A hacker looks out over a city amid graphs of increasing trend lines and numerical rates.
A computer monitor displays code and a pixelated skull, surrounded by virus wireframes.

A man using a mobile phone in shadow against a bright wall

Amid the pandemic, using trust to fight shadow IT

With most workers scattered at home and trying to come up with their own ad-hoc IT workarounds, there’s an easy way for IT shops to build trust: communicate.

Layoffs  >  A stressed businessman carries away his personal belongings in a cardboard box.

The CISO's guide to securely handling layoffs

Follow these 10 best practices to limit risks to your organization.

covid 19 coronavirus paper boat in water floating sinking by himmlisch pixabay

CIOs reshape IT priorities in wake of COVID-19

Surfacing from crisis mode, CIOs find themselves redefining IT priorities, thanks to budgets in flux, a rising need to refine business processes, and new outlooks on the future of work.

COVID-19 coronavirus scam alert

8 ways attackers are exploiting the COVID-19 crisis

Cybercriminals are taking advantage of the coronavirus crisis to spread malware, disrupt operations, sow doubt and make a quick buck.

COVID-19 contact tracing app

4 critical issues surrounding contact-tracing apps

As countries rush to release contact-tracing apps, experts fear a lack of security and privacy controls.

Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

5 tips for leading IT from home

Leadership is being redefined in quarantine as IT executives find themselves overseeing IT operations from home. Here’s how to lead your department from a distance.

coronavirus covid 19 pandemic cio technology 5073359 by geralt pixabay cc0 2400x1600

IT’s 10 biggest challenges amid COVID-19

The coronavirus pandemic has disrupted IT operations across nearly every industry. Here’s how IT leaders are rising to the challenges.

Abstract trend lines graphing change and transformation.

COVID-19 pandemic accelerates transformation in enterprise security

Organizations must retool their policies and invest in security programs to acclimate to a post-COVID-19 business landscape.

Microsoft  >  RDP | Remote Desktop Protocol vulnerabilities  >  caution / danger / admin login

Attacks against internet-exposed RDP servers surging during COVID-19 pandemic

Two new reports show a dramatic increase in cyber attacks that target open RDP ports as more people work remotely.

Activating a protective virtual shield amid COVID-19 coronavirus morphology

4 tips for protecting users from COVID-19-targeted attacks

Remote users in particular are vulnerable to coronavirus-themed phishing attempts, malicious domains, and repurposed malware. Protect them with these basic steps.

A roll of hundred dollar bills sits atop a silhouette of virus morphology.

Salesforce unveils tools for a post-pandemic return to the office

Work.com contains apps and information resources to support organizations as business looks to resume operations in many countries.

coronavirus covid 19 pandemic disease binary map world 5060518 by mintblack4u pixabay cc0 2400x1600

COVID-19 attack campaigns target hardest hit regions, research shows

Attackers shift their focus to where coronavirus infections are rising and use tactics that make their efforts hard to block.

Zoom video conferencing  >  One user connected via laptop showing a grid of remote participants.

7 ways to make your Zoom meetings safer

Learn to use the tools Zoom gives you to secure online conferences.

young man on video conference coronavirus remote communication telecommuting by gcshutter getty ima

Update: Coronavirus prompts collaboration tool makers to offer wares for free

Several vendors, including Microsoft, Google, Slack, Zoom, Cisco and LogMeIn, are making chat, videoconferencing and other collaboration services free as demand for remote working booms.

A split digital tunnel streaming binary code.

How to minimize the risks of split tunnel VPNs

Split tunnel virtual private networks have some advantages for supporting remote workers connecting to a Windows network, but they come with risks. Here's how to best protect your network.

video conferencing / remote work / online meeting

Review: 5 top videoconferencing services put to the test

We compared Zoom, Cisco Webex, Microsoft Teams, GoToMeeting, and Google Meet in real-world tests to see which videoconferencing platforms perform best for business users. Here’s how they stack up.

CSO > breakthrough / penetration testing / hammer breaking binary glass

4 ways automated penetration testing tools can help mitigate COVID-19 related risks

New tools map attack surface, test security controls, and behave like cyber-adversaries.

health doc connect care telemedicine

Telehealth booms amid COVID-19 crisis; virtual care is here to stay

The coronavirus pandemic that has erupted worldwide has pushed telehealth to the forefront. It's unlikely remote medicine will go away, even after the current crisis abates.

Load More