Survey: Enterprise security pros doubtful they can prevent mobile breaches

 
At least once a week – usually after pounding on my iPhone to access a business document, texting a family member, and calling a colleague on another continent, all in a matter of minutes – I’m reminded how complete the shift to mobile computing has been. It’s hard imagining what it was like working without our trusted smartphones and tablets. Mobile devices are indeed critical to getting work done in 2017. They are also treasure troves of personal and business data. And there are threat actors out there who want to get their hands on that data. We learned long ago to secure our PCs from cyberattacks, but it’s puzzling why most businesses still fail to secure employees’ ...

CRN Gives Check Point’s Star Partner Program 5 Stars

 
For the school kids in our neighborhood, getting a gold star from the teacher is a pretty big deal. Despite providing the world’s toughest cyber security, we’re still big kids at heart when it comes to receiving great recognition for stellar performance. This is why we are pretty stoked that CRN’s Partner Program Guide has bestowed their prestigious 5-Star award winning program rating on Check Point’s Star Partner Program. In fact, this is the first year that Check Point applied for the program and immediately received the 5 Star rating. Computer Reseller News (CRN)’s annual partner program guide is the industry’s ultimate source for information about IT vendors’ ...

Stranger things: Securing your network in the upside down world of SDx

 
The smash hit Netflix series ‘Stranger Things’ centers around the mysterious disappearance of residents of Hawkins, Indiana. Those who vanish find themselves in a frightening, parallel nether-world called the ‘Upside Down’, where things are not exactly as they seem. For some organizations, moving from physical hardware-based networks to SDx public or private clouds can feel similarly alien. While the familiar, conventional network construct still exists, the security infrastructure has disappeared since there’s no physical infrastructure to get to grips with. So what do they do next? What makes SDx strange? As we know, SDx stands for software-defined infrastructure. That ...

The latest findings on Chrysaor (Pegasus for Android) are even more stealthy

 
Earlier this week Google published a research about a new sophisticated spyware tool for Android, believed to be related to the Pegasus malware for iOS, which was discovered in August 2016. As Google wrote in their blog, the malware was most likely created by the authors of Pegasus – the NSO group, and shares many common features as Pegasus. What’s the big news? Chrysaor is a fully developed spy tool for Android devices, and can allow attackers to surveil their targets’ every move. Chrysaor has implemented elaborate modules to listen in on conversations, take screenshots and surveil the device’s surroundings, steal sensitive data and read SMS messages. This malware presents a ...

Stopping Your Staff from Raining Data from the Cloud

 
No matter what your company’s official position is on the use of cloud services, your employees absolutely depend on them as part of their day-to-day work. The problem: the services they tend to use usually aren’t the ones you want them to use. A 2015 study of cloud usage found that employees were using 15 times more cloud services than their IT departments estimated or authorized; an average company also uses over 1,100 cloud services, of which just 8% meet the data security and privacy requirements of enterprises. In light of this, it’s no surprise that data breaches from cloud services happen frequently. An October 2016 Ponemon study of nearly 650 IT professionals in North ...