CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Image of Manila skyline representing the Philippines National Privacy Commission on the Comeleak data breach
Cyber SecurityNews

‘Comeleak’ Allows Philippine National Privacy Commission to Show Teeth

January 25, 2017
Privacy issues in the Philippines have become headline news as 2017 gets underway. In January, the National Privacy Commission (NPC) in that country issued a statement placing the blame for a data breach that put the personal information of millions of voters at risk squarely at the feet of the Commission on Elections (COMELEC) and its Chairman Andres Bautista. Read More
Phone with Netflix app logo and mask on table showing the increase in scam websites mimicking online streaming services
Cyber SecurityNews

‘Dramatic Rise’ in Scam Websites Mimicking Online Streaming Services

May 4, 2020
700 scam websites pretending to offer online streaming services are taking advantage of the recent pandemic lockdowns to steal personal data and credit card information. Read More
Police’s evidence boxes showing the data dump of police files from hundreds of U.S. law enforcement agencies
Cyber SecurityNews

“BlueLeaks” Data Dump Contains Police Files of Hundreds of Law Enforcement Agencies, Tied Back to a Third-Party Services Provider

July 6, 2020
Data dump containing 269 GB of police files from hundreds of U.S. law enforcement agencies and the FBI is found to be tied to a breach at a shared third-party vendor. Read More
Toy robot in front of a monitor showing the security concerns over the chrome extensions used by checkout bots to snap up delivery time slots.
Cyber SecurityNews

“Checkout Bots” Use Chrome Extensions to Automatically Snap up Delivery Time Slots, But Are They Safe?

May 19, 2020
Checkout bots are gaining popularity in coronavirus pandemic to snap up delivery time slots through Chrome extensions including those that may contain security vulnerabilities. Read More
Hacker with cellphone showing threat of "juice jacking" at public USB charging stations
Cyber SecurityNews

“Juice Jacking” at Public USB Charging Stations? Los Angeles County DA’s Office Issues Warning, but How Real Is the Threat?

November 28, 2019
While there is no evidence at present of a rash of "juice jacking attacks on public USB charging stations, or even any novel exploits of this nature, appropriate precautions should still be taken. Read More
CPU processor socket on a computer motherboard showing the Intel chip vulnerability that impacts five years worth of computers
Cyber SecurityNews

“Unfixable” Intel Chip Vulnerability Could Undermine Encryption on Five Years Worth of Computers, But Is a Difficult Attack to Pull Off

March 16, 2020
Attacker exploiting new Intel chip vulnerability will need to go through multiple complex steps and have physical access to the device to gain full access to the system. Read More
Image of confused man sitting in front of computer about to type signifying insider threats within the organization
Cyber SecurityInsights

“Real” Insider Threats Already Lurking Within Your Organization

February 28, 2018
While we often think about malicious users when we speak of insider threats, the "real" problem lies with users that may unintentionally be putting their organizations at risk. This includes users that get phished, bypass controls for convenience or efficiency, and connect their own devices to the corporate networks. Read More
Window of the multi-story building showing how secure facilities face RF security threats
Cyber SecurityInsights

“Some Devices Allowed” – Secure Facilities Face New RF Threats

August 27, 2020
RF-enabled devices are now prevalent in the enterprise and RF security is getting harder to enforce in secure facilities that require more nuanced electronic device policies. Read More
Hooded hacker stealing data from laptop showing data breach at Washington State Auditor which impacts unemployment claimants and may result in identity theft
Cyber SecurityNews

1.6 Million Washington State Unemployment Claimants Have Financial Information Exposed in Hack of State Auditor’s Office

February 9, 2021
1.6 million unemployment claimants in Washington may have just received an identity theft headache. A hack of the State Auditor's office has exposed extremely sensitive personal information. Read More
Woman with face covered by hair showing how 2015 Ashley Madison data breach leads to new cyber extortion scams
Cyber SecurityNews

2015 Ashley Madison Data Breach Leads to New Cyber Extortion Scams

February 21, 2020
Hackers used data from 2015 Ashley Madison data breach to conduct cyber extortion scams, asking users to pay more than $1,000 worth of Bitcoin. Read More
Load More

Latest

Magnifying glass over VMware website showing security bug affecting VMware servers

Over 6,700 VMware Servers With Remote Code Execution Security Bug Exposed to the Internet

Retro robots watch bots on TV showing increase in marketing fraud

The Growing Problem of Marketing Fraud: Bots Pose as Legitimate Internet Users to Fake Traffic, Milk Digital Advertising Services

Padlock on keyboard showing importance of CMMC framework for cybersecurity and data privacy

Reflecting Back on Data Privacy Day 2021: Why This Day Mattered More Than Ever Before

A Macbook Pro keyboard showing problem with macOS malware

macOS Malware Silver Sparrow Affects About 40,000 Macs Running Both Intel and ARM Chips

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results