CSO

CSO Daily

January 15, 2019

Image: Vulnerabilities found in building access system used by schools, governments

Vulnerabilities found in building access system used by schools, governments

Tenable Research discovered four zero-day vulnerabilities in IDenticard's PremiSys access control system, which is used by schools, governments, medical centers, and Fortune 500 companies. Currently no patches are available. Read more ▶

Your Must Read Stories

•

Vulnerabilities found in building access system used by schools, governments

•

Three encrypted Slack alternatives worth a look

•

How cyber competitions can help fill the cybersecurity talent shortage

•

How to protect backups from ransomware

•

Why you need a digital forensics team (and the skills to look for)

•

2 critical ways regulations and frameworks weaken cybersecurity

•

Best resources for setting up Microsoft Office 365 security

White Paper: Microsoft

The Productivity Puzzle

Productivity remains one of the top issues facing businesses today.And while there’s no doubting the importance of trying to get the most out of your talent, the approach many organizations take actually has the reverse effect. This is the ‘productivity puzzle’. Read more ▶

Image: Three encrypted Slack alternatives worth a look

Three encrypted Slack alternatives worth a look

Slack is not end-to-end encrypted, leaving workplaces that use the popular collaboration tool vulnerable to both hackers and nation-state attacks. These encrypted alternatives will keep your team chats private. Read more ▶

Image: Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

FROM OUR BUSINESS PARTNERS

Get 90% Off Your First Year of RemotePC, Up To 50 Computers for $6.95

RemotePC by iDrive lets you connect to your work or office computer securely from anywhere, and from any iOS or Android device. Right now their 50 computer package is 90% off or just $6.95 for your 1st year. Read more ▶

Image: How cyber competitions can help fill the cybersecurity talent shortage

How cyber competitions can help fill the cybersecurity talent shortage

The Cyber Security Challenge Masterclass event helps employers find skilled but non-traditional job candidates. Read more ▶

 
 
Image: How to protect backups from ransomware

How to protect backups from ransomware

Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps. Read more ▶

Image: Why you need a digital forensics team (and the skills to look for)

Why you need a digital forensics team (and the skills to look for)

Prevention and detection aren't enough. To better defend against future intrusions, you need a strong digital forensics team that can analyze attacks. Read more ▶

Image: 2 critical ways regulations and frameworks weaken cybersecurity

2 critical ways regulations and frameworks weaken cybersecurity

Security regulations and frameworks are good and necessary, but they can be inflexible and draw focus away from the most significant security risks. Read more ▶

Image: Best resources for setting up Microsoft Office 365 security

Best resources for setting up Microsoft Office 365 security

Office 365 presents admins with many choices and options. These information sources, online forums and script repositories can help you make the right decisions. Read more ▶

White Paper: Microsoft

10 myths about moving to the cloud

Most companies that choose to move to the cloud do so because they have decided they need it for business agility and want the cost savings that come with it. How can you know whether or not you’re getting it all? Read more ▶

You are currently subscribed to CSO Daily as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.