CSO

CSO Daily

August 21, 2019

Image: How to avoid using RDP on Windows

How to avoid using RDP on Windows

Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it where possible. Here’s how. Read more ▶

Your Must-Read Stories

•

How much should you spend on security?

•

Marketing security: 8 tips for recruiting users to your cause

•

6 risk factors to know when hiring an MSSP

•

Beware rogue email rules and forms

•

Taxpayer First Act: Improving identity verification and modernizing the IRS

•

Safe travels: 7 best practices for protecting data at border crossings

Solution Brief: Barracuda

How Cybercriminals are Impersonating Google Docs, Outlook and DocuSign to Steal Your Credentials

In this solution brief, we will examine how attackers are cunningly impersonating popular web services such as Microsoft Outlook, DocuSign and Google Docs to entice victims into giving away their credentials to these services. Read more ▶

Image: How much should you spend on security?

How much should you spend on security?

Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Marketing security: 8 tips for recruiting users to your cause

Marketing security: 8 tips for recruiting users to your cause

Getting users to care about security is a much-lamented challenge. What you need is a marketing plan. Read more ▶

 
 
Image: 6 risk factors to know when hiring an MSSP

6 risk factors to know when hiring an MSSP

A managed security services provider can effectively extend an organization's security capabilities or provide affordable security infrastructure if you avoid these common mistakes. Read more ▶

Image: Beware rogue email rules and forms

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here’s how to make sure you can detect it. Read more ▶

Image: Taxpayer First Act: Improving identity verification and modernizing the IRS

Taxpayer First Act: Improving identity verification and modernizing the IRS

With citizens' PII at risk, some federal agencies like the IRS are moving away from knowledge-based verification. It's time for them all to follow suit. Read more ▶

Image: Safe travels: 7 best practices for protecting data at border crossings

Safe travels: 7 best practices for protecting data at border crossings

Border agents are requesting access to devices and the data on them with no regard to your organization's security policies. Here's how to protect that data and your employees. Read more ▶

Sponsor Article: Barracuda

Threat Spotlight: Lateral Phishing

Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to CSO Daily as [email protected].
Learn more about
Insider
Copyright © 2019 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].