Good news ! Hackbusters community is waiting for you !
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at:

How to manage FileVault 2-enabled accounts via Terminal


The virtues of enabling FileVault 2 to encrypt the contents of your Apple computer's storage are known to all security professionals. Serving as a means of protecting data from unauthorized access, tampering, or exfiltration, encryption often remains the "last man standing" after a data breach has occurred and can prevent threat actors from using the information stolen by scrambling its contents with strong, not so easy to break algorithms.

But encryption is not a set-it-and-forget-it type of technology—it requires ongoing maintenance to ensure it is doing its job properly. This means that first and foremost, the process is keeping data safe. Second, the data is available to the users authorized to work with it. Third, and just as important as one and two, unauthorized users are not allowed to access the protected data. This doesn't just apply to threat actors, but also former users that are no longer allowed to mingle with the data—not managing this aspect of the...(continued)

View All Trending Stories