Remove Hotels Remove Malware Remove Network Remove Software
article thumbnail

Hackers Seek to Score Against Super Bowl Cyber Defense

SecureWorld News

Major sporting events like the Super Bowl face elevated cyber risks due to the proliferation of connected networks and devices used by venues, teams, vendors, media, and attendees. Large venues increasingly utilize sophisticated networks to conduct commerce, manage operations, engage fans, and gather data. This year, the U.S.

Malware 104
article thumbnail

FBI Warns Against 'Juice Jacking' at Public Charging Stations

SecureWorld News

No charging station is safe, apparently, as the FBI is warning travelers looking to charge their devices in airports, hotels, and coffee shops that "juice jacking" is a thing—as bad actors are using public chargers and even free cables and charging plugs to infect phones and other devices with malware.

Malware 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What to Know About Enterprise Travel Security

SecureWorld News

They may also provide a hacker with confidential information or access to the enterprise network. Cybersecurity threats are growing more severe , and experts agree that training is one of the best ways for businesses to defend their employees, customers, and networks. These risks may threaten the health and security of a traveler.

Travel 72
article thumbnail

An expanded attack surface: The cybersecurity challenges of managing a hybrid workforce

CIO Business Intelligence

At a recent CIO New Zealand roundtable event in Auckland, supported by Palo Alto Networks and Vodafone New Zealand, senior technology executives from organisations across Aotearoa discussed the challenge of keeping security front of mind when the workforce is dispersed. The other key aspect is implementing zero trust networking.

Exercises 107
article thumbnail

CIOs Have To Treat Social Media With Care

The Accidental Successful CIO

Once they have done this they can use it in countless ways to break into your company’s network. that gets you to click on a dubious link, inadvertently giving them access to the network. The bad guys have upped their game and now they are using AI and software tools to quickly gather great deals of information. across accounts.

Media 130
article thumbnail

How to Pick the Right Technology to Enable the Remote Workforce

CIO Business Intelligence

It combines zero-trust network access (ZTNA) , data loss prevention tools , and remote browser isolation (RBI) to enable advanced threat protection and complete control over data — regardless of how users access and manage it. In both cases, the data never touches the corporate network. Lock the front door. Bar the exits.

How To 79
article thumbnail

Breach at MGM Resorts Shuts Down IT Systems, Affects Hotel Room Access

SecureWorld News

MGM Resorts International, a casino and hotel chain, announced that it had suffered a cybersecurity breach on Monday, September 11. As a result of the breach, some customers were unable to make reservations, use their credit cards, or access their hotel rooms. The technology in gambling is astounding.

Hotels 122