CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Man clicking smart house icon on virtual screen showing 4 in 10 smart buildings at risk of cyber attack in new Kaspersky report
Cyber SecurityNews

New Kaspersky Report Suggests 4 in 10 Smart Buildings at Risk of Cyber Attack

October 7, 2019
Attention is turning from smart home to smart building with Kaspersky report showing nearly 4 in 10 of smart buildings affected by a malicious cyber attack attempting to infect computers that control automation systems.
Read More
Disassembled iPhone showing the new un-patchable iPhone exploit that allows permanent jailbreak
Cyber SecurityNews

The New Unpatchable iPhone Exploit That Allows Permanent Jailbreak Is a Game-Changer for Mobile Security

October 4, 2019
New iPhone exploit allows anyone to permanently jailbreak by using a USB cable to bypass the bootROM. The exploit compromises all models from iPhone 4S to iPhone X and cannot be fixed with a software update.
Read More
Cargo ship and plane showing the need to re-focus on supply chain cyber security with the attacks on multiple Airbus suppliers
Cyber SecurityNews

Attacks on Multiple Airbus Suppliers Demonstrate a Need for Renewed Focus on Supply Chain Cyber Security

October 4, 2019
With evidence pointing to a nation-state attacker behind the attacks on multiple Airbus suppliers, companies should really take supply chain cyber security seriously even for smaller vendors.
Read More
Closeup view of car dashboard showing the reference indicators to gauge an organization’s security posture
Cyber SecurityInsights

What Indicators Can I Reference to Gauge My Organization’s Security Posture?

October 3, 2019
A clear security posture helps to represent an organization’s cybersecurity capabilities. There are several indicators that can help to gauge where your organization belongs within the risk management structure.
Read More
Business people in meeting room showing business leaders spending less than a day per year focusing on cyber risk
Cyber SecurityNews

Marsh-Microsoft Survey: Business Leaders Spend Less Than a Day Per Year Focusing on Cyber Risk

October 2, 2019
While 79% of respondents in recent Marsh and Microsoft survey ranked “cyber risk” as a top risk management concern, only 17% of C-suite or board members spend more than a few days per year focusing on it.
Read More
Woman using calculator to calculate bills showing how the cyber insurance payouts are encouraging more ransomware attacks
Cyber SecurityNews

Cyber Insurance Payouts Are Only Encouraging More Ransomware Attacks

October 1, 2019
Cyber insurance companies are choosing to settle things quickly with a ransom payment during ransomware attacks for fear of covering all the business interruption costs and delays of re-booting a company from scratch.
Read More
Free WiFi signboard showing the holes in public WiFi security with WeWork breach of confidential business information
Cyber SecurityInsights

WeWork Breach of Confidential Business Information Serves as a Good Reminder About the Holes in Public WiFi Security

September 30, 2019
WeWork, a co-working company which operates in world's biggest cities, was reported running a WiFi security breach since 2015. Companies’ information was exposed to anyone who has local network password in the office.
Read More
Hacker writing code on computer showing how Ecuador data breach of 20 million user information leads to the fast-tracking of an improved data privacy law
Cyber SecurityNews

Leak of the Personal Information of 20 Million in Ecuador Data Breach Leads to Fast-Tracking of an Improved Data Privacy Law

September 27, 2019
People of an entire country were put at risk with Ecuador data breach of 20 million user information. The breach has accelerated a data privacy law that has been under consideration for months.
Read More
Woman using laptop showing the main benefits of using new MacOS Catalina for data privacy
Cyber SecurityInsights

The Main Benefits of Using New MacOS Catalina for Data Privacy

September 25, 2019
New MacOS Catalina announced in June 2019 had captured interests of many users with the promise to take them further. What are the benefits when it comes to data security and privacy?
Read More
Instagram icon on mobile showing the Instagram data leak which exposed millions of users’ full names and phone numbers
Cyber SecurityNews

Instagram Data Leak Exposes Account Information Including Full Names and Phone Numbers

September 23, 2019
Even though the recent Instagram data leak only expose contact information of millions of users, knowledge of phone numbers could create a pathway for SIM swap attacks.
Read More
1 … 131 132 133 134 135 … 165

Latest

Yodel delivery Service logo sign showing cyber incident suspected ransomware

Yodel Parcel Delivery Service Disrupted by a Suspected Ransomware Cyber Incident

Hacker exploit vulnerability Log4Shell on VMware servers

CISA and Coast Guard Cyber Command Warn About Hackers Leveraging Log4Shell Vulnerability on VMware Servers

Finger pointing at digital lock showing privacy enhancing technologies (PETs)

What Are Privacy-Enhancing Technologies (PETs) And How You Can Choose the Right One(s)

Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results