<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><strong>Want to be in the know but don’t have time to read lengthy article after article on your commute or during the workday? Here’s a quick place to check for up-to-date cyber security news. </strong></p> <!--more--><p>To easily stay relevant with security headlines, straight from our VP of Security &amp; Intelligence, John Bambenek, follow our blog.</p> <p>Today in the news…</p> <p><a href="https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2018/09/24/the-cybersecurity-202-why-lawmakers-personal-accounts-are-a-prime-target-for-foreign-hackers/5ba7abb21b326b7c8a8d15f9/?noredirect=on&amp;utm_term=.3854ea90443d">Why</a> lawmakers’ personal accounts are a prime target from foreign hackers.</p> <p><strong>Main Takeaway Points:</strong></p> <ul> <li>Hackers don’t need to come through the front door, they can compromise personal accounts and use those devices to get into your network.</li> <li>With the rise of BYOD, you have an increase in the amount of devices you don’t control that are on your network. If they get compromised at home, they come to the office and compromise your internal network.</li> <li>Using <a href="https://threatstop.com/solutions/threatstop-dns-firewall-overview" rel="noopener" target="_blank">DNS Firewall</a> and <a href="https://threatstop.com/solutions/ip-firewall-protection" rel="noopener" target="_blank">IP Firewall</a>, it is possible to block already compromised machines from connecting to their masters when inside your network. That means that both you can protect your network and notify the user they are infected so they can protect their own personal information</li> <li>With ThreatSTOP's <a href="https://threatstop.com/solutions/roaming-endpoint" rel="noopener" target="_blank">DNS Roaming</a>, you can provide your employees enterprise security at home, so they don’t get compromised to begin with.</li> </ul> <p>For even more content, check us out and see what we’re about at <a href="http://www.threatstop.com">www.threatstop.com</a>.</p></span>