CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Man using laptop with cloud network map on top showing data breach at PCM cloud solution provider which exposed Office 365 administrative credentials
Cyber SecurityNews

Cloud Solution Provider PCM Discloses Client Information Breach Just Days After Insight Acquisition Announcement; What Happens Next?

July 4, 2019
Cloud solution provider PCM claimed minimal impact to their customers even though recent breach of Office 365 administrative credentials could lead to exposure of personal data and sensitive business documents.
Read More
Businessman waiting in airport showing the risks of visual hacking for business travelers
Cyber SecurityNews

3M’s Global Visual Hacking Study Highlights Risks for Business Travelers

July 4, 2019
Despite the potential for visual hacking to take place in public, only 30% of business travelers say that their organizations have educated them on how to protect sensitive information.
Read More
Businessman stopping domino effect showing small vendors may not be the most vulnerable targets in supply chain security
Cyber SecurityNews

New Supply Chain Security Study Indicates Small Businesses May be Getting a Bum Rap

July 1, 2019
Supply chain security is a hot issue for enterprises with increasing third party data breaches. Recent (ISC)² study indicates these breaches are more likely the fault of a large enterprise partner than a small one.
Read More
Smoke emitting from power plant showing possible U.S. cyber attack on power grid in Russia
Cyber SecurityNews

Possible U.S. Cyber Attack on Power Grid in Russia; Is Cyber Warfare on the Table?

June 28, 2019
Russia has been making news for hacking utility systems in other nations and for a change, news has emerged that U.S. is conducting cyber attack on power grid in Russia by planting malicious code.
Read More
Documents in filing cabinets showing how AMCA healthcare data breach could set a new precedent for health IT security
Cyber SecurityNews

AMCA Healthcare Data Breach Could Set a New Precedent for Health IT Security

June 26, 2019
Medical companies affected by AMCA healthcare data breach have begun alerting investors and shareholders which may cause them to lose tens of millions of dollars in stock market valuation.
Read More
Businessman working at desk showing the things to include in an appropriate cybersecurity policy
Cyber SecurityInsights

Drafting an Appropriate Cybersecurity Policy

June 26, 2019
A good cybersecurity policy not only protects your business against cyber threats but can also tell you what to do when face with cyber attacks. What should be included when developing one?
Read More
Hacker using computer showing most cyber attacks on China are from U.S.
Cyber SecurityNews

New CNCERT Report Shows Most Cyber Attacks on China Originate from United States

June 24, 2019
One key finding from CNCERT report shows most cyber attacks are using U.S. servers to implant viruses and carry out botnet attacks against Chinese computer assets.
Read More
Crime scene tape showing the key cyber security trends from 2019 ISACA annual report
Cyber SecurityNews

Cyber Crime Widely Underreported Says ISACA 2019 Annual Report on Cyber Security Trends

June 21, 2019
Recent 2019 ISACA annual report shows key interesting cyber security trends which includes underreporting of cyber crimes and internal employees being the third-greatest security threat.
Read More
Check-in counters at border showing data breach at U.S. Customs and Border Protection subcontractor which exposed around 100,000 travelers’ data
Cyber SecurityNews

U.S. Customs and Border Protection Data Breach Result of Supply Chain Attack

June 19, 2019
Data breach of U.S. Customs and Border Protection agency’s subcontractor has exposed around 100,000 travelers’ images which further highlight the importance of vendor security compliance.
Read More
Keys on hook with opened padlocks on keyboard showing polymorphic phishing attacks making up almost half of phishing attempts
Cyber SecurityNews

Polymorphic Phishing Attacks Now Make Up Almost Half of All Phishing Attempts

June 18, 2019
Polymorphic phishing attacks are highly effective as they use randomization of email components which are hard to be detected by signature-based email security tools.
Read More
1 … 136 137 138 139 140 … 163

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results