-
1 month ago |
esecurityplanet.com | Jenna Phipps
IPVanish and NordVPN are VPN solutions that offer customers multiple pricing options, a mobile VPN, and various privacy features. IPVanish is an affordable VPN with multiple support channels, including phone. NordVPN is a popular solution with four plans and many features. I’ve compared both VPNs, including their plans and features, to help you decide which is better for you.
-
Jan 7, 2025 |
techrepublic.com | Jenna Phipps
IVPN’s fast factsOur rating: 3.4 out of 5Starting price: $6 per user per monthKey features:KillswitchAnti-tracking and ad blockingMobile app for Android and iOSMultihop VPN Image: IVPNIVPN is a VPN solution for consumers and entrepreneurs, also offering a Teams solution if you’re looking for an option for your business. Its main features include a killswitch, multihop, ad and website blocking, and schedules for IP address rotation.
-
Nov 12, 2024 |
esecurityplanet.com | Jenna Phipps
Compare Norton and McAfee antivirus software. We assess features like malware detection, real-time protection, pricing, customer support, and more.
-
Nov 4, 2024 |
esecurityplanet.com | Jenna Phipps
We’re looking at cloud credential theft (not good) and a big win for early vulnerability fixes (better) this week, as well as critical Mitsubishi Electric and Rockwell Automation bugs that could affect industrial control environments. Additionally, a SSL certificate weakness in qBittorrent has finally been fixed after 14 years of vulnerability. Also, Microsoft hasn’t yet developed a fix for Windows 11 downgrade attacks, which were first announced this summer at the Black Hat conference.
-
Oct 31, 2024 |
esecurityplanet.com | Jenna Phipps
Cybersecurity training for employees is essential in 2025, as evolving threats require an informed and vigilant workforce to protect sensitive information. Modern cybersecurity training programs equip teams with the knowledge to identify and prevent potential security breaches using engaging videos, interactive quizzes, and real-world phishing simulations.
-
Oct 28, 2024 |
esecurityplanet.com | Jenna Phipps
Like last week, this week’s theme continues to be vulnerabilities, discovered months ago, that are still rearing their head. A July Microsoft SharePoint issue has been added to the Cybersecurity Infrastructure and Security Agency’s catalog of known exploitable vulnerabilities. Additionally, VMware released a patch for an already-patched vulnerability from last month due to an insufficient heap overflow fix.
-
Oct 25, 2024 |
esecurityplanet.com | Jenna Phipps
Database security solutions help protect sensitive business and customer information from external and internal users. They use customized security policies and rules, access controls, and data masking technologies to restrict data access to authorized users that absolutely need it. To help your business select a database security solution, I’ve evaluated multiple providers and their features and narrowed down the final list to the top products.
-
Oct 25, 2024 |
esecurityplanet.com | Jenna Phipps
Single sign-on solutions are security software products that typically fall under the identity and access management (IAM) umbrella. SSO products help teams manage user identities, both employees and customers, and grant and limit their access to company applications. They play a critical role in protecting sensitive data and applications because SSO reduces password sprawl and limits the time window in which a threat actor could hack an application.
-
Oct 21, 2024 |
esecurityplanet.com | Jenna Phipps
One theme that our recent vulnerability recaps have revealed is that threat actors are consistently exploiting flaws with already-active patches. Sometimes, the flaws have been fixed for months during an exploit. It’s challenging for security teams to patch all the software solutions your business uses rapidly, but let this be your weekly reminder to prioritize patching schedules. Today, we’re looking at GitHub, Grafana, and Apple vulnerabilities.
-
Oct 15, 2024 |
esecurityplanet.com | Jenna Phipps
Truly securing your network infrastructure is one of the most critical choices your business can make to protect itself from threats. Technologies and tools like firewall rules, patch management, and incident response procedures help guard your sensitive data and applications. This process will vary depending on your business, but there’s a 13-step process, from assessing your network to improving security over time, that works for many organizations.