article thumbnail

Busting 5 Common Myths About Vulnerability Assessment

Tenable

Video conferencing and VoIP solutions that became must-haves for remote-operating organizations (as necessitated by the COVID-19 pandemic) were common attack vectors during 2020. When self-propagating malware enters any part of your system, it immediately begins searching for conduits through which it can spread to other systems.

SMB 101
article thumbnail

IoT Security Concerns - How Secure Is the Hybrid Workforce?

Palo Alto Networks

According to the survey, 78% of IT decision-makers reported an increase in non-business-related IoT devices showing up on corporate networks in the last year. This attack demonstrates how mixing corporate IT and IoT devices on the same network can allow malware to spread from vulnerable IoT devices to the corporate IT devices or vice-versa.

IoT 70