T-Mobile hackers claim to have data on millions
The seller of data on more than 100 million T-Mobile customers — stolen from company servers — told Motherboard that “full customer info” is for sale; the company has said little other than that it is investigating. The seller reportedly wants more than $250,000 for 30 million Social Security and driver’s license numbers.
Why do hackers hack?
Cyberattacks and malware infections may seem random, but many are thoroughly planned out with handpicked targets. By understanding the effect of an increasingly digital landscape on the mind, you can thwart cyber disasters and develop security measures designed to outsmart the human brain. Learn more.
False positives from IT solutions are causing headaches
Amplitude Research polled 450 security decision-makers and found that almost half believe their organization is sufficiently protected against external threats. Another finding: 47% said their automated cybersecurity solutions create so many false positives that they ignore half of the solutions’ alerts.
It’s time to recognize passwords must be improved
Improving cybersecurity is no longer a matter of throwing tactics and tools at a vulnerability, writes Brian Gale of threat monitoring platform FYEO. Gale’s suggested first step: “Pick a password manager that all employees, regardless of technical know-how, can use.”
Watch for IT burnout as working from home persists
Now that it looks as though working from home will be extended at many companies, burnout among IT professionals will increase unless a “digital-first” mindset prevails, says Nicholas Avila of consulting firm Globant. “Most organizations were not ready for the pandemic, and deep down, most would prefer to go back to the pre-pandemic state so they can use their usual methods to build teams and ensure progress on projects,” Avila adds.
Looking for “unicorn” or “rock star” often doesn’t work
Leaders hiring for cybersecurity jobs “artificially limit their talent pool by overburdening their job search with narrowly defined qualifications,” says Zaira Pirzada of research firm Gartner. Tech vendors are often guilty of using terms such as “unicorn” and “rock star” to describe their needs, which creates biases, adds Ian McShane of security software provider Arctic Wolf.
More CyberSecurity News at https://que.com/tag/cybersecurity