Cybersecurity | TechRepublic News, Tips, and Advice for Technology Professionals
- Multi-Factor Authentication Policyon February 21, 2025 at 7:52 am
The need to safeguard sensitive data and systems from unauthorized access is always a major concern. This is especially true for companies that handle vast amounts of documents, such as personal information, financial accounts, and proprietary business resources. Different forms of cyberattacks are becoming more complex, and traditional single-factor authentication methods (e.g., passwords) seem to …
- Steam Malware Alert: PirateFi Game Spreads Vidar Infostealerby TechRepublic Staff on February 19, 2025 at 4:45 pm
PirateFi, a Steam game, was found spreading Vidar malware, stealing user data. Steam removed it, but gamers must take urgent security steps.
- Identity Theft Protection Policyon February 11, 2025 at 8:05 am
Help protect your employees and customers from identity theft. This customizable policy, written by Scott Matteson for TechRepublic Premium, outlines precautions for reducing risk, signs to watch out for, and steps to take if you suspect identity theft has occurred. While such misfortune may not be 100% preventable for everyone who follows these guidelines (since …
- Quick Glossary: Cybersecurity Attackson February 4, 2025 at 8:29 am
It doesn’t matter whether your organization is a huge multinational business enterprise or a one-person operation. At some point, your computer networks and systems will be attacked by someone with criminal intent. Cybersecurity attacks, in all their various forms, are inevitable and relentless. This quick glossary, written by Mark W. Kaelin for TechRepublic Premium, explains …
- How to Build an Effective Security Operations Centeron January 29, 2025 at 7:30 am
Taking a coordinated security approach is one way to leave no loopholes. By this, we are referring to a cybersecurity architecture that comprises a team and security components working together in sync to provide more effective security operations as opposed to the usual fragmented approach, which often leaves businesses without a coordinated response to threats. …
- 10 Ways AI Can Help Organizations Tackle Cyberattackson January 28, 2025 at 8:22 am
Legacy security measures, while offering a baseline level of protection, heavily rely on predefined signatures and a narrow definition of the “abnormal.” They often follow a reactive approach, can be siloed, limiting information sharing, and lack the scalability to handle the terabytes of data generated by today’s complex IT systems. This is where artificial intelligence …
- Mobile Device Computing Policyon January 28, 2025 at 8:00 am
Mobile devices are a way of life in both the consumer and business realms — and business interests must be protected where the two converge. This customizable policy, written by Scott Matteson for TechRepublic Premium, provides guidelines for the safe and productive use of mobile devices (laptop computers, tablets, smartphones, etc.) by employees. It includes …
- IT Leader’s Guide to Two-Factor Authenticationon January 23, 2025 at 8:31 am
Cybersecurity threats are multiplying with each passing year. They are growing more sophisticated, as shown by the continued success enjoyed by ransomware and other scams. Two-factor authentication is a time-tested way to minimize the threat of a breach and protect the organization as well as the individual from attacks. Drew Robb, writing for TechRepublic Premium, …
- How to Spot a Phishing Email Attempton January 21, 2025 at 7:30 am
Phishing attacks are one of the most common types of data breach attempts, with 3.4 billion phishing emails being sent every single day, according to Splunk. Furthermore, 80% of organizations globally have reported phishing attempts that target their employees, proving just how widespread these attacks are. The rise of ChatGPT and similar generative AI tools …
- Social Engineering Awareness Policyon January 16, 2025 at 8:16 am
Recent technological advancements have made people and things more interconnected. Unfortunately, people with malicious intent are also taking advantage of this capability. With this, the security of information systems has become more paramount for any organization. The purpose of this customizable Social Engineering Awareness Policy, written by Maria Carrisa Sanchez for TechRepublic Premium, is to …
- How to Run a Cybersecurity Risk Assessment in 5 Stepson January 15, 2025 at 8:35 am
Though cybersecurity is on every executive’s checklist today, most struggle with growing compliance burdens, keeping the costs moderate, and bringing team alignment. A cybersecurity assessment is the key to combating the rising threat environment, and it’s prudent to secure systems before a breach cripples your business. Read this guide, written by Avya Chaudhary for TechRepublic …
- Best Practices for Password Creation and Storageon January 8, 2025 at 8:43 am
Nearly half of Americans, 46%, have had a password stolen in the previous year. Out of all the accounts that were breached, more than three-quarters (77%) of those users had their personal information stolen, such as their personal address, credit card number and Social Security Number. Password attacks on businesses can expose even more critical …
- TechnologyAdvice Industry Trend Report: The Security and AI Landscape in 2025on January 7, 2025 at 11:02 pm
Cyber threats are getting smarter, and businesses can’t afford to fall behind. This TechnologyAdvice Industry Trend Report, sponsored by Check Point Software, explores the biggest security challenges of 2025—from the explosion of AI adoption to the critical importance of Zero Trust Architecture (ZTA). With breaches on the rise and ransomware payouts hitting record highs, organizations …