Category Archives: Best practices

What is Shadow OT and why you should know what it is:

Shadow IT

Photo by Lewis Burrows from Pexels

Yes, you read it correctly: Shadow OT, with an O. We have barely managed to deal with Shadow IT, and a new threat already looms at the horizon. Operational Technology (OT) has become as affordable and available as IT, which leads to yet another cause of IT management worries.   

Continue reading

Three different companies, three similar security challenges, one comprehensive approach

A hospital, a government organization and a television broadcaster: their business models couldn’t be further apart, yet they struggle with very similar security challenges. All three asked Trend Micro to help them out, and all three now enjoy comprehensive and easily managed company wide security. Continue reading

Why digital extortion works better than blackmail

Door David Sancho, Senior Antivirus Researcher, Trend Micro

Smart cybercriminals rely on rational decisions

Cybercriminals today are going all in with digital extortion. Their business model isn’t exactly new. “I want you to do this, or I’ll break your legs”, is easily translated to “I want you to do this, because I have your data.” Extortion has always existed and it’s a brilliant business model, albeit an unethical one. Therefore, I’m not at all surprised by the popularity of the digital variant today. You only have to look at the massive succes of ransomware to see wat I mean. Continue reading

Zero Day vulnerabilities and no updates? No reason to panic!

Guest blog by Chris Van Den Abbeele – Global Solution Architect Datacenter en Cloud Security, Trend Micro

Automated virtual patching raises your security level and lowers your operational expenses.

Updating can be a painful process. It takes a lot of time, isn’t without risk and inherently leads to downtime. Virtual updates are just as safe, immediately available and best of all, free of complications. Physical updates remain a necessity, but in order to address the most urgent issues, you’re better off going virtual. Continue reading

Gartner Research: How to Prioritize and Remediate Active Vulnerabilities

Vulnerabilities and their exploitation are still the root cause of most breaches. Astonishingly, Gartner predicts that through 2020, 99% of the vulnerabilities exploited will continue to be the ones known by security and IT professionals for at least one year!

 

Continue reading

Beyond Catching Sender Spoofing – using AI to stop email fraud and Business Email Compromise

In September, we announced our new email security technologies powered by XGen™ and a new product, Smart Protection for Office 365. One key technology introduced was our new AI based Email fraud, or Business Email Compromise (BEC), detection technique. Continue reading

As cities get smarter, so should their security

Today, more urban centers than ever are implementing a range of advanced technological systems: it’s the beginning of so called smart cities. These sensors and networks used in combination with citizens’ mobile devices create smarter cities capable of reduced pollution, increased safety, better engagement with residents and more accessible transportation options. As the majority of the world’s population – 65 percent – will call a city home by 2040, these IoT-centered, city-wide initiatives are well worth the investment. Continue reading

Five Cybersecurity Resolutions Every CISO Should Have On Their List

As we bid farewell to the final days of 2016, it’s time to start looking ahead to the New Year and what we hope to accomplish within the next 365 days. Year after year, some Chief Information Security Officers (CISOs) set lofty goals of securing all data to fullest extent wherever it resides in their company’s network. However, as many New Year resolutions go, these aspirations often fall because they’re not founded on sound enterprise risk management principles. Continue reading

The risks of using pagers in healthcare

5 attack scenarios and 3 tips how to avoid them

Article written by specialists at the Trend Micro Foward-Looking Threat Research Lab

Over sixty years ago, healthcare professionals were among the first to adopt a new communication tool: the pager. This little instrument combined technology from walkie-talkies and automobile radios, resulting in a handy little tool that allowed the transmission of messages (or ‘pages’) to other pagers up to 25 miles away. And although smartphones have taken over communication in the outside world, the healthcare industry has never really said goodbye to pagers. They offer a few crucial advantages to healthcare professionals: they don’t suffer from the often weak cellular coverage in hospitals nor do they interfere with medical equipment. Continue reading

The Top 5 Myths of Next-Gen Endpoint Protection

‘Next-generation’ endpoint protection or next-gen AV has been getting a lot of press recently. But what does the term actually mean? For IT security managers under pressure, the most important thing isn’t the latest buzzword but finding a solution which is effective in protecting their organization from an increasingly agile and determined online enemy. Multiple threat protection techniques working in synergy is the key to this. Continue reading