Attention is turning from smart home to smart building with Kaspersky report showing nearly 4 in 10 of smart buildings affected by a malicious cyber attack attempting to infect computers that control automation systems.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
New iPhone exploit allows anyone to permanently jailbreak by using a USB cable to bypass the bootROM. The exploit compromises all models from iPhone 4S to iPhone X and cannot be fixed with a software update.
With evidence pointing to a nation-state attacker behind the attacks on multiple Airbus suppliers, companies should really take supply chain cyber security seriously even for smaller vendors.
A clear security posture helps to represent an organization’s cybersecurity capabilities. There are several indicators that can help to gauge where your organization belongs within the risk management structure.
While 79% of respondents in recent Marsh and Microsoft survey ranked “cyber risk” as a top risk management concern, only 17% of C-suite or board members spend more than a few days per year focusing on it.
Cyber insurance companies are choosing to settle things quickly with a ransom payment during ransomware attacks for fear of covering all the business interruption costs and delays of re-booting a company from scratch.
WeWork, a co-working company which operates in world's biggest cities, was reported running a WiFi security breach since 2015. Companies’ information was exposed to anyone who has local network password in the office.
People of an entire country were put at risk with Ecuador data breach of 20 million user information. The breach has accelerated a data privacy law that has been under consideration for months.
New MacOS Catalina announced in June 2019 had captured interests of many users with the promise to take them further. What are the benefits when it comes to data security and privacy?
Even though the recent Instagram data leak only expose contact information of millions of users, knowledge of phone numbers could create a pathway for SIM swap attacks.