Cost of a data breach is becoming more serious every year. Latest IBM-Ponemon study reports an average figure of $3.92 million which is 12% higher than it was just five years ago.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
With lessons learned from 2016 U.S. presidential election, U.S. government officials are taking no chances in upcoming election security by pushing stricter measures to secure online information from cyber attacks.
Winnti malware makes a “comeback”, victimizing major international firms including Bayer, BASF, Siemens and others. The attackers are particularly interested in industrial secret and tracking movements of specific people.
With the aid of technology, insider fraud has outranked all other forms of fraud for modern businesses, ironically the companies are also using it to pre-emptively stop fraudsters in their tracks.
A poorly configured Amazon cloud database resulted in the Capital One breach exposing information of 106 million U.S. and Canadian customers and applicants. What are the five steps that organizations can take to prevent such attacks?
Majority of SMBs still do not believe they will be likely targets of cyber attacks despite the fact that 60% of the companies go out of business within six months after suffering an attack.
Global cyber war no longer seems impossible with state-sponsored cyber attacks mounting around the world and possibility of China, Iran and Russian uniting to go against U.S. in the cyber domain.
Even though Norsk Hydro cyber attack is projected to cost the company $75 million, the refusal to pay ransom and transparent working with law enforcement during the attack could mean a new standard for cyber security.
Just a few simple strings on malware are all it takes to defeat Cylance antivirus software. This is a crushing blow for those who predicted AI and machine learning are the future of antivirus protection.
All citizens in Kazakhstan are forced to install a government-issued national security certificate as part of Internet surveillance strategy. This certificate will allow government to read all their messages or even alter them.