article thumbnail

Extra Crunch roundup: ‘Nightmare’ security breach, Poshmark’s IPO, crypto boom, more

TechCrunch

How did fashion marketplace Poshmark go from posting regular losses in 2019 to generating net income in 2020? The hacks of Fire Eyes and SolarWinds were just one link in the chain: How well is your company prepared to deal with file-encrypting malware, hackers backed by nation-states or employees accessing secure systems from home?

Retail 263
article thumbnail

Patch Management Policy Features, Benefits and Best Practices

Kaseya

Patching is one of many compliance requirements, and failing to do so can lead to audits, fines and even denial of insurance claims in the case of a breach. This report can be used for compliance audits, insurance claims and even to demonstrate value to clients. Ensures security and compliance. Automate when possible.

Policies 109
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Low Hanging Fruit scanner strategy can get you into trouble

Jeremiah Grossman

Vulnerabilities identifiable in an automated fashion, such as with a scanner, can be loosely classified as “low-hanging fruit" (LHF) -- issues easy, fast, and likely for bad guys to uncover and exploit. Cross-Site Scripting, SQL Injection, Information Leakage, and so on are some of the most typical forms of website LHF.

article thumbnail

Implementing a Secure Transit DMZ Architecture with Next-Gen Firewalls

Aviatrix

Customers want to maintain similar security and compliance postures in their AWS environments as they have on-premises. Malware Detection the use of systems to detect transmission of malware over a network or use of malware on a network. Co-Author: Karthik Balachandran, Cloud System Engineer, Aviatrix.

article thumbnail

Mobile Device Management (MDM): How It Works, Best Practices, Benefits and Challenges

Kaseya

Some common tasks that IT teams undertake using an MDM are: Remotely managing, monitoring and securing devices and distributing applications, updates and content in a timely fashion. Furthermore, reporting gives administrators visibility into user activity, ensuring compliance with company policies and guidelines.

Mobile 52
article thumbnail

Mobile Device Management (MDM): How It Works, Best Practices, Benefits and Challenges

Kaseya

Some common tasks that IT teams undertake using an MDM are: Remotely managing, monitoring and securing devices and distributing applications, updates and content in a timely fashion. Furthermore, reporting gives administrators visibility into user activity, ensuring compliance with company policies and guidelines.

Mobile 52
article thumbnail

Make Secure Access for Techs as Simple as Clicking a Button

Kaseya

Picture the scenario: The support helpline is on hold; the executive on the other side is waiting to get help with a malware-infected laptop that belongs to his boss. The fact of the matter is that no one takes cybersecurity in a lackluster fashion these days. What is your technician up to? Going Beyond Passwords.