Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AT&T Cybersecurity

3 Steps to better cybersecurity in touchless business solutions (part 1 of 3)

The current pandemic that has upended our lives and wreaked havoc across the world have also humbled countries to a shocking degree. As borders closed, so did major sectors, industries, and businesses. Brick-and-mortar establishments had to cease operations and resume their business remotely to comply with quarantine measures. As conditions are getting better, the next challenge is for governments to restore both lives and livelihoods.

Why right now is the best time to assess your cyber response to COVID-19

The initial response to the COVID-19 pandemic put cybersecurity programs to the test. While organizations quickly rolled out business continuity plans to transition workers from the office to the home and to migrate business online to keep customers and supply chains moving, cybersecurity leaders have worked to help keep the business protected from an onslaught of cyber threats designed to prey on the disruption and uncertainty caused by COVID-19.

Cybersecurity for small business supply chain management

Small businesses are significant contributors to the economy. According to the U.S. Small Administration, they generate approximately 44% of the gross domestic product (GDP) in the U.S. However, small to medium enterprises (SMEs) are also frequently more vulnerable to the threats of our contemporary digital landscape.

Cybersecurity in education: Securing schools as they transition to online learning

Whether they were prepared for it or not, schools around the world have been forced to adopt an online learning model for students thanks to the COVID-19 pandemic. One of the biggest concerns educators need to have in this situation is exactly how to create a fully secure remote learning environment in order to keep sensitive information for both the schools and individual students safe from hackers.

Bluetooth security risks explained

What would we do without Bluetooth these days? Our earbuds and headphones would have to use annoying wires. We would have one less way to transfer files between your laptop and your phone. And how would you connect your phone to your car? But as a wireless data transfer standard, of course Bluetooth has some associated cybersecurity risks.

Are airports and airlines prepared for cyber threats post COVID-19?

The COVID-19 pandemic has unveiled numerous vulnerabilities and shortcomings in the airline industry. What’s worse for aviation in particular over other industries is how airports have essentially served as the portal for the virus traveling from one country to another across the globe. As a result of severe travel restrictions implemented by nearly every country, airline companies have been hit hard and forced into a dire financial situation.

Stories from the SOC - detecting network anomalies with OTX

This Investigation was initiated on the basis of several Network Anomaly alarms triggered by ongoing suspicious activity on an employee device owned by a financial institution. During the discovery phase of the Investigation, we identified abnormal egress traffic to a known Indicator of Compromise (IOC) based on intelligence from the Open Threat Exchange™ (OTX®).

Keeping kids safe online

As we all know by now, the Internet is an excellent tool for business, learning, and entertainment. Not only is it a tool, but it's also an essential part of our lives. Information, connections, and opportunities at the touch or swipe of a finger. As more and more people go online, the age of the average user becomes lower and lower. What is the responsibility we have to safeguard the wellbeing of those that come after us into this new digital age?