CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Young woman having video conferencing call showing cybersecurity shortcuts while remote working
Cyber SecurityNews

Most Employees Took Cybersecurity Shortcuts During the Remote Working Period Despite Understanding the Risks

August 6, 2021
Employees took cybersecurity shortcuts during the remote working period believing that they weren't as important and that their IT departments would protect them and handle their faults.
Read More
Magnifying glass on the motherboard of home routers showing know vulnerabilities
Cyber SecurityNews

Most Popular Home Routers Plagued by Known Vulnerabilities, Which Vendors Continue to Ignore

July 17, 2020
Study showed that most popular home routers contain known vulnerabilities in their firmware, with no security updates over the last 12 months for 46 out of 172 router models.
Read More
Person typing at laptop computer showing MOVEit cyber attacks
Cyber SecurityNews

MOVEit Cyber Attack Has Many More Victims Than Previously Thought; Attackers Experimented With Vulnerability Since 2021

June 19, 2023
Ransomware gang Cl0p posted a list of victims of its MOVEit cyber attacks. Among what it calls the 'first batch' of its targets are both federal and state government agencies, major banks and investment firms, and universities.
Read More
Hacker hand stealing data showing MOVEit data breach of government contractor impact health data
Cyber SecurityNews

MOVEit Data Breach Hits US Government Contractor, Exposes Health Data of 8 to 11 Million People

August 2, 2023
The damage tally from the massive MOVEit data breach continues to go up, as a US government contractor is reporting that 8 to 11 million records of health data have been exposed.
Read More
Hacker in hoodie showing MOVEit data breach via third-party affecting customer data of German banks
Cyber SecurityNews

MOVEit Data Breach Leaks Deutsche Bank, ING, Postbank, and Comdirect’s Customer Data

July 19, 2023
German banks Deutsche Bank AG, ING, Postbank, and Commerzbank’s subsidiary Comdirect, have leaked customer data via third-party service provider MOVEit data breach.
Read More
Red open padlock icon among closed padlocks showing zero-day vulnerability in file transfer software
Cyber SecurityInsights

MOVEit Transfer Zero-Day Vulnerability: What Companies Need to Know

June 20, 2023
File transfer services play crucial roles in securing business and government operations, but companies must be aware of the inherent risks and adopt mitigations to safeguard against those risks.
Read More
Woman with high tech smart glasses showing how movies can help you understand data privacy and hacking
Cyber SecurityInsights

Movies That Can Help You Understand Data Privacy and Hacking

August 29, 2019
Movies are not that far off from reality if you consider how these 6 films help you understand data privacy and hacking in a world of technology imagined by directors and story writers.
Read More
Woman using tablet with cloud icon showing multi-cloud security as new number one IT challenge for businesses
Cyber SecurityNews

Multi-Cloud Security Is the New #1 IT Challenge for Businesses

December 13, 2019
New study finds multi-cloud security to be the biggest IT challenge for businesses as the authorization and authentication handoffs between the different services provide opportunity for things to go wrong.
Read More
Discord social network logo on a smartphone showing hacked Discord bot impacted NFT projects
Cyber SecurityNews

Multiple NFT Projects Attacked After Commonly-Used “Mee6” Discord Bot Hacked

May 23, 2022
Mee6 is a very popular Discord bot that automates a wide variety of functions. A compromise led to an assortment of associated NFT services seeing spam and hacking attempts.
Read More
Laptop displaying red code in a dark room showing the struggle on national ransomware epidemic faced by U.S. municipalities and local government agencies
Cyber SecurityNews

Municipalities, Local Government Agencies Struggling With National Ransomware Epidemic

October 10, 2019
National ransomware epidemic hits municipalities, school districts and local government agencies with 621 attacks recorded this year. Things are so bad that U.S. is drafting new legislation to prevent, mitigate and respond to future attacks.
Read More
1 … 134 135 136 137 138 … 234

Latest

Aerial view of cement factory showing ransomware attack on industrial control systems manufacturer

Johnson Controls International Suffered a Massive Ransomware Attack Potentially Impacting the DHS

Using smart home app on phone showing consumer trust

Securing the Evolution of Smart Home Applications

Man using tablet showing security budget and cybersecurity spending

Security Budget Increases Only 6% On Average, Organizations Slowing Cybersecurity Spending in Uncertain Economy

Hook against digital background showing phishing attacks by initial access broker

Initial Access Broker Targeting Organizations With Microsoft Teams Phishing Attacks

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results