A vast majority of employees today work from mobile devices, but managing mobile devices – both company and employee owned – is a universal challenge. This challenge is equally as pressing for small and medium-sized businesses (SMBs) as it is for large enterprises. Chris Pyle, president and CEO of Champion Solutions Group, offers five ways SMBs can improve their mobile security posture.
What were the most commonly used passwords last year? "123456" and "password," according to an annual ranking of password use by SplashData.
One in seven users is using the same password for all their online accounts, according to the new Consumer Security Risks Survey conducted by security vendor Kaspersky. This places those users at a high risk of having more than one online account compromised in the event of a data leak.
More than 20 percent of companies do not lock out mobile users based on number of access attempts and more than 70 percent of companies do not require two-factor authentication for mobile devices, according to a survey of 447 IT decision-makers across industries by Champion Solutions Group for cloud-based document sharing service MessageOps.
Cable, IT, phone and Internet provider Comcast said it plans to reset about 200,000 customer accounts after the accounts' log-in and password combinations appeared on an underground marketplace over the weekend, reported ZDNet.
Android lock patterns, which Google introduced as an alternative to passwords, are not necessarily harder to guess or more secure than passwords.
The St. Louis Federal Reserve Bank has suffered a cyberattack in which its domain name servers were hijacked, security blogger Brian Krebs reported on Monday.
In a twist of irony, an initiative by Hilton Hotels & Resorts to prompt members to change the passwords of their account culminated in the discovery of a bug that could allow hackers to take over any number of accounts, if they knew the 9-digit number of a valid account.
The top news stories for Feb. 17, 2015.
It remains the conversation we're afraid to have: the one that leads us to the conclusion that the only way to secure our communications is with a system that reliably identifies us.