Should you monitor your employees’ online activities?

To monitor or not to monitor — that is the question. Employee monitoring is a touchy subject. If you’ve ever considered it, then you may ask yourself if it is a good idea for an employer to check on their staff’s online activities. Below are the pros and cons of employee monitoring, and some helpful tips should you push through with it.

Watch out for this Android malware

Security researchers have discovered a new Android malware called DEFENSOR ID that snuck its way into the Google Play Store. Forensic analysis shows that the malware takes advantage of an Android device’s Accessibility Services to infiltrate the system and cause damage without being detected.

Here’s what to look for when buying antivirus software

Because of the global pandemic, work from home is now a necessity. This has increased the potential entry points for cybercriminals to infiltrate your network. Now more than ever, businesses need better cybersecurity protection. That’s why it’s important to choose the right antivirus software for your needs.

How to work from home securely

Encouraging staff to work from home is extremely vital in the midst of the COVID-19 outbreak. By minimizing social interactions and contact risks, you can reduce the spread of the virus. But be warned. Transitioning from a fully managed business environment to a home office can leave you vulnerable to cyberattacks and online scams.

Office 365 hacking: What you need to know

Some hackers have become so skilled that they don’t even need you to give up your credentials to hack into your account. One recent cyberthreat is targeted towards users of Microsoft Office 365. You don’t want to be the next victim, so read up.
A phishing scam that harvests users’ credentials
The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials.

Mitigating cybersecurity insider threats

Did you know that in some industries the biggest cybersecurity threats come from inside a breached organization? Sometimes it's motivated by financial gain and sometimes it's plain-old ignorance. So how can you protect your organization from insider threats?
#1 Educate
You must teach your team to recognize personally identifiable information (PII) and understand the financial implications of a breach.