Six Pillars To Effective Meeting Room Collaboration

Being reliable makes collaboration viable. When video conferencing is backed by a secure cloud architecture and rigorous control processes, the ability to effectively manage risk and avoid service outage makes enterprise communications seamless in today’s ‘always-on’ economy. With the rapidly changing and unpredictable nature of global business, it is vital for those wishing to lead […]

React Apps Data Exposed Via Unprotected MongoDB Database

It has been reported that a popular family tracking app was leaking the real-time locations of more than 238,000 users for weeks after the developer left a server exposed without a password. The app, Family Locator, built by Australia-based software house React Apps, allows families to track each other in real-time, such as spouses or parents wanting to […]

Federal Emergency Management Agency’s (FEMA) Data Leak Exposes Data Of 2.3M Survivors

Data Leak

It has been reported that the Federal Emergency Management Agency’s (FEMA) has disclosed a data leak that exposed banking details and other personal information of 2.3 million survivors.  Expert Comments Below:  Tim Mackey, Senior Technical Evangelist at Synopsys:  “At the risk of becoming political, the disclosure by FEMA that it released identifiable information to a contractor about requests […]

ASUS Software Updates Hacked, Installed Malicious Backdoors

Reports from Kaspersky Lab researchers found out that computer giant ASUS installed a malicious backdoor last year on thousands of users’ computers after a server for its live software updates was hacked, and issued legitimate ASUS digital certificates with bogus software updates. PC giant Asus fell prey to elaborate 2018 attack, Kaspersky says https://t.co/Eydf7vGWm8 — Bloomberg […]

Top Five Ways The Human Factor Threatens Your Data Security

Data protection regulations have become stricter and now focus on protection of data privacy of consumers. New state regulations like the California Consumer Privacy Act (CCPA) force businesses to make it their top priority. However, many companies lack a strong cybersecurity culture and therefore become more vulnerable to security and compliance issues. According to a whitepaper […]