About Shane Berger

This author has not yet filled in any details.
So far Shane Berger has created 158 blog entries.

Concerns about data breaches hitting all-time high

Organizations from various industries across the globe are increasingly hip to the magnitude of the problem posed by data breaches, with 44% of them feeling “very” or “extremely” vulnerable to data threats, according to some of the key takeaways from the global edition of Thales’ 2018 Data Threat Report. This is a sharp increase from 30% [...]

By | 2018-02-16T19:22:02+00:00 February 16th, 2018|Uncategorized|0 Comments

Patch now! Microsoft fixes over 50 serious security flaws

his week saw the second Tuesday of the month, and everyone who is responsible for protecting Windows computers knows what that means: another bundle of security patches have been releasedby Microsoft. This month’s “Patch Tuesday” included security updates for Internet Explorer, Microsoft Edge, Microsoft Windows, Microsoft Office, Adobe Flash Player, and other software, tackling over 50 [...]

By | 2018-02-15T15:41:26+00:00 February 14th, 2018|Uncategorized|0 Comments

How businesses can keep their employees safe online

From social media to online banking to email, Secure Anchor CEO Eric Cole explains how employee web activity can compromise your company's network. Unfortunately, humans can be a significant threat vector. TechRepublic spoke with Eric Cole, CEO of Secure Anchor, about how businesses can protect their employees while online and at work. "Make employees [...]

By | 2018-02-12T17:08:59+00:00 February 12th, 2018|Uncategorized|0 Comments

Hackers are now attacking Cisco ASA VPN bug

Cisco researchers are now aware of attempted attacks leveraging a vulnerability in its Adaptive Security Appliance. A major vulnerability affecting Cisco's Adaptive Security Appliance is now under attack by hackers, according to Cisco. Companies that use a Cisco Adaptive Security Appliance should update the software as soon as possible to avoid issues associated with [...]

By | 2018-02-09T18:25:33+00:00 February 9th, 2018|Uncategorized|0 Comments

How to encrypt files on a Ubuntu server with Tomb

Looking for an easy to use, command line encryption tool for Linux? Jack Wallen walks you through the process of creating encrypted vaults with Tomb. Data security: Two words that cause more and more IT admins to lose their hair. With each passing week, it grows harder and harder to ensure your data is safe [...]

By | 2018-02-08T16:35:15+00:00 February 8th, 2018|Uncategorized|0 Comments

Why it’s important to avoid FUD fatigue and threat rigidity when making security decisions

Crying wolf to elicit a certain response is poor cybersecurity, contributing to a phenomenon called threat rigidity. Here's advice on successfully guiding your organization through a security incident. Relying on Fear, Uncertainty, and Doubt (FUD) as a security strategy lasts only so long before FUD fatigue—the digital version of the boy who cried wolf—comes into [...]

By | 2018-02-06T18:38:09+00:00 February 5th, 2018|Uncategorized|0 Comments

IT industry revenue will grow 5% this year, driven by cloud, AI, IoT

The IT sector is poised to grow in 2018, amid higher expectations for business value, security, transparency, and equal access to opportunity. IT sector revenue is projected to grow 5% in 2018. — CompTIA, 2018 The top IT sector trends to watch in 2018 include advances in the cloud, artificial intelligence (AI), and the [...]

By | 2018-02-02T20:34:49+00:00 February 2nd, 2018|Uncategorized|0 Comments

Data Privacy vs. Data Protection: Reflecting on Privacy Day and GDPR

As we approach Data Privacy Day 2018, consider this question: how much risk do you believe theft or exposure of private data poses to human health, safety, or prosperity? ESET security researchers posed that exact question to over 700 US adults last year. Respondents were asked to rate the risk on an eight point scale [...]

By | 2018-01-31T20:41:25+00:00 January 31st, 2018|Uncategorized|0 Comments

Here are the ‘most clicked’ phishing email templates that trick victims

Wombat's state of phishing report shows that attack rates remain steady, but there is some good news: User Click rates have dropped. The most successful phishing attacks are now consumer focused, instead of business focused. The merging of business and personal email accounts is a major threat to corporate security.—Wombat Security IT professionals need [...]

By | 2018-01-29T13:30:46+00:00 January 29th, 2018|Uncategorized|0 Comments

How the private sector and US government can work together to defend against cyberattacks

Sharing information about cyberthreats that face both private corporations and the government can benefit both institutions, according to attorney and former CIA case officer Jack Rice. TechRepublic's Dan Patterson spoke to attorney and former CIA case officer Jack Rice to discuss why private corporations and the US government should work close together to defend [...]

By | 2018-01-29T13:35:38+00:00 January 26th, 2018|Uncategorized|0 Comments