Attackers are looking to steal your data or money, wreak havoc or use you to get intellectual property from your work. With the rising rates of cyberattacks and the impact having progressed to include loss of life, we all have a part to play in the fight against cyber crime. Ensuring that we always perform our due diligence and not fall victim to preventable attacks is a step in the right direction.
This article uses the seven stages of an attacker’s kill chain to outline handy tips for securing your trip away from home.
Spring Cleaning Checklist for Keeping Your Devices Safe at Work
When the pandemic first hit, organizations were forced to shift from mainly supporting corporate-owned, fully managed devices to supporting personal devices used for work purposes. This abrupt move to remote work forced companies to quickly shift their networking and security capabilities, creating a large amount of risk to their organization. Without proper security measures in place, these unmanaged BYOD devices grant employees access to company resources and sensitive data, which poses a potential risk for sensitive data to be leaked, inadvertently or on purpose.
The opinions or conclusions of the authors reflected in the open source articles and resources is not endorsed and/or does not necessarily reflect the opinion of the Virginia Fusion Center. The sources have been selected to provide you with event information to highlight available resources designed to improve public safety and reduce the probability of becoming a victim of a crime.
------------
You have received this message because has subscribed to the "CyberAware" mailing list. Should you wish to unsubscribe please click the link below.