Ryan Francis

Contributor

Ryan Francis has been in the tech publishing field for 17 years.

Hackers continue to troll LinkedIn

Hackers continue to troll LinkedIn

These attacks are becoming more common because it’s easy and inexpensive. Cylance has created some tips to help fend off these attacks.

Study finds devices are not wiped properly

Study finds devices are not wiped properly

The National Association for Information Destruction (NAID) found in a recent study that 40 percent of the devices that bought from secondhand markets had PII on them.

Social engineering fake outs

Social engineering fake outs

Learn how a consultant infiltrated his client’s buildings and networks.

How to stop insider threats

How to stop insider threats

There are a number of things that decision makers can do to protect their companies and minimize, if not eliminate, the threat of employee theft of sensitive and confidential information.

Enterprises misaligning security budget, priorities

Enterprises misaligning security budget, priorities

Those on staff who are doing the budgeting might blindly write the same amount into the security line every year. Or the C-suite might handcuff the security personnel with a tight budget that doesn’t allow for expansion into new...

Report says smart people do dumb things online

Report says smart people do dumb things online

People from the religious and legal fields were considered lazy for not following security standards.

What to consider in developing BYOD policy

What to consider in developing BYOD policy

In today’s work environment, employees are increasingly expected to be constantly available and communicating. Regardless of whether the company permits it, employees will use their personal devices for work. Instead of ignoring the...

How much is a bug worth?

How much is a bug worth?

With recent increases in bug bounty amounts in the news, Bugcrowd shows how a bug bounty amount is calculated.

Do you have an incident response plan in place?

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.

Fragmentation: the silent killer in security management

Fragmentation: the silent killer in security management

Today’s detection deficit between attackers and defenders is near an all-time high – and the gap is only getting wider. While many factors contribute to this deficit, among the top is the fragmentation of people, processes, and...

Hire a DDoS service to take down your enemies

Hire a DDoS service to take down your enemies

With the rampant availability of IoT devices, cybercriminals offer denial of service attacks to take advantage of password problems.

Five tips to be ‘security smart’ this tax season

Five tips to be ‘security smart’ this tax season

Every year there are scams to dupe you into filing your taxes with the wrong collector

7 tips for developing a powerful data disaster plan

7 tips for developing a powerful data disaster plan

Commvault has provided the following tips that will help enterprises develop simple yet powerful holistic data protection plans that enable enterprises to quickly recovery the data they need if there is a data disaster, in an...

Report finds the security of confidential documents is a significant problem

Report finds the security of confidential documents is a significant problem

60 percent of survey respondents say sensitive documents have accidentally been sent to the wrong person.

Disaster recovery: How is your business set up to survive an outage?

Disaster recovery: How is your business set up to survive an outage?

Can your business get by with an asynchronous backup or must that offsite server be updated by the second to keep the business up and running at all times.

Honeypot catches social engineering scams on social media

Honeypot catches social engineering scams on social media

Research company investigates 40,000 fake accounts to find impersonator tactics. 

7 tips to strengthen online security

7 tips to strengthen online security

If you are online today, checking email, buying someone a gift, posting to Facebook, paying bills, streaming Netflix, or monitoring your sleeping baby, you need to practice these seven tips for protecting your online presence.

How to respond to a cyber attack

How to respond to a cyber attack

Following a breach, organizations should focus on mitigating damage and data loss and providing information to law enforcement. Partner at Ballard Spahr, LLP and former Assistant U.S. Attorney Ed McAndrew and Guidance Software...

7 universal rules of threat intelligence

7 universal rules of threat intelligence

Levi Gundert, vice president of intelligence and strategy at Recorded Future, will go over the seven universal rules of threat intelligence – what you should be doing no matter what, whether you use a platform or not.

What should an insider risk policy cover?

What should an insider risk policy cover?

To protect from liability concerns, enterprises need something in writing so that everyone knows what to do upon finding an insider threat. Here are some suggestions from security experts.

Load More