Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Unsanctioned Computer Support Costs Companies $88K per Year
Newest First  |  Oldest First  |  Threaded View
alemax
alemax,
User Rank: Apprentice
6/30/2017 | 7:32:32 AM
Re: Interesting Stats
You are totally right, I have the same opinion. 
RyanSepe
RyanSepe,
User Rank: Ninja
5/30/2017 | 9:24:27 AM
Interesting Stats
This is a good mechanism for comparing work productivity, or lack of, for an overall group of employees.
RyanSepe
RyanSepe,
User Rank: Ninja
5/30/2017 | 9:18:59 AM
Re: This will only get worse because...
I'm not so convinced that working remotely would increase this cost. The article states that these services are being provided to other departments. I think that working remotely would further segment departments from a social aspect, thus having an employee from a different department less likely request this type of help. Just my opinion.
LindsayCybSafe
LindsayCybSafe,
User Rank: Strategist
5/25/2017 | 6:17:28 AM
This will only get worse because...
Remote working is on the up, as people are using private devices more often and unsecured wifi networks to do work related activites, including uploading sensitive docs to cloud storage. Cybsafe is best to use to educate your workforce and update them with real time threat intelligence.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Machine Learning, AI & Deep Learning Improve Cybersecurity
Machine intelligence is influencing all aspects of cybersecurity. Organizations are implementing AI-based security to analyze event data using ML models that identify attack patterns and increase automation. Before security teams can take advantage of AI and ML tools, they need to know what is possible. This report covers: -How to assess the vendor's AI/ML claims -Defining success criteria for AI/ML implementations -Challenges when implementing AI
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-40886
PUBLISHED: 2022-10-03
DedeCMS 5.7.98 has a file upload vulnerability in the background.
CVE-2022-41040
PUBLISHED: 2022-10-03
Microsoft Exchange Server Elevation of Privilege Vulnerability.
CVE-2022-41082
PUBLISHED: 2022-10-03
Microsoft Exchange Server Remote Code Execution Vulnerability.
CVE-2022-42003
PUBLISHED: 2022-10-02
In FasterXML jackson-databind before 2.14.0-rc1, resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled.
CVE-2022-42004
PUBLISHED: 2022-10-02
In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.