article thumbnail

Busting 5 Common Myths About Vulnerability Assessment

Tenable

Video conferencing and VoIP solutions that became must-haves for remote-operating organizations (as necessitated by the COVID-19 pandemic) were common attack vectors during 2020. Myth #4: "You don't need to scan isolated or unconnected systems.". Just under 50% of SMBs were specifically hit with a ransomware attack.

SMB 101
article thumbnail

IoT Security Concerns - How Secure Is the Hybrid Workforce?

Palo Alto Networks

As you'll learn below, individuals and companies are at risk due to cybercriminals taking notice. This attack demonstrates how mixing corporate IT and IoT devices on the same network can allow malware to spread from vulnerable IoT devices to the corporate IT devices or vice-versa.

IoT 68
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Security policies are intended to define what is expected from employees within an organization with respect to information systems. The objective is to guide or control the use of systems to reduce the risk to information assets. Now we need to know our information systems and write policies accordingly. Write Policies.

Policies 107