Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

6 ways to optimize OS imaging

Any organization with an IT infrastructure has to deal with imaging and deploying operating systems to its workforce. Frequent onboarding of employees can cost huge amounts of time and effort for the IT team. Depending on the number of machines, the effort involved in migrating and upgrading operating systems can also be significant. This can be streamlined with the help of a comprehensive OS imaging and deployment solution allowing the IT team to focus on other productive tasks.

How to achieve and maintain data compliance in 2023

Only those hiding from the news, prospects, and customers can miss the data security and privacy challenges that are occurring. More businesses are relying on data analytics (garnered from data collection) for more and improved service and product offerings. More individuals want data privacy and security. More nations want their citizens protected from corporate tactics that rely on mining and scraping personal data. More customers want tailored experiences that only come through data analytics.

A Guide on 5 Common LinkedIn Scams

The fact that scammers haunt Facebook and Twitter is not surprising. Even so, digital criminals don’t stop with just those two platforms. They’re also known to stalk users on LinkedIn where connections carry greater professional gravity. Fortunately, users can stay alert of such activity by familiarizing themselves with the most common types of LinkedIn scams. In no particular order, here are five such ruses that should be on everyone’s radar.

The Language of Cybersecurity Frameworks, Guidance, Regulations, and Standards

When it comes to acronyms, Technology and Cybersecurity often rival various branches of government. Technology acronyms are usually somewhat bland, amounting to little more than the arcane argot of the profession, such as SOC, SIEM, and DNS.

Big Trends From the 2023 Okta Business at Work Report

This year’s Okta Business at Work annual report highlights growth, despite national headlines with concerns about a recession and economic contraction. Given Okta’s role as a leading identity service provider, the growth theme is good news for stronger authentication and protection against access compromise, phishing, and ransomware.

The ION Ransomware Crisis: A Wake-Up Call for Organizations

Ransomware appears to be one of the most expensive and disruptive internet afflictions. It is a type of malware that encrypts the victim's files and vital information, and hackers demand payoffs to provide the decryption keys. While ransomware is not any new form of attack on cybersecurity, the prevalent scenario is indeed alarming; the following numbers corroborate the same- It seems that individuals and organizations are likely to get affected by ransomware attacks even in 2023 and beyond.

GuLoader - a highly effective and versatile malware that can evade detection

The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. This blog was jointly authored with Arjun Patel. GuLoader is a malware downloader that is primarily used for distributing other shellcode and malware such as ransomware and banking Trojans.

Nearly 50% of healthcare organizations suffer from data breaches

The findings from a recent Gartner Peer Insights survey- Cybersecurity in the Healthcare Industry- show that nearly half of participating healthcare organizations have experienced a data breach in the past two years. As the number of connected and unmanaged devices increases, threats targeting IoT, IoMT and OT devices can undermine patients' confidence in the ability of healthcare organizations, and the industry as a whole, to deliver high-quality care and protect their safety.