CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Fish hook with keys on computer circuit board showing phishing and need for security awareness
Cyber SecurityInsights

What To Do When Your Organization Become the Victim of a Phishing Attack

July 20, 2021
Knowing the common manipulative tactics – exploiting every emotional hot button (anxiety, uncertainty, urgency) – used in phishing is the first step to understanding how to identify and deflect them; and it requires a repetitive process.
Read More
Hacker using computer showing ransomware attack
Cyber SecurityNews

Hackers Demand Hefty Ransom After Successful Ransomware Attack on Telecom Giant

July 31, 2020
Telecom Argentina, the largest telecommunications company in the country, was hit by ransomware attack involving the REvil ransomware group who is demanding $7.5 million.
Read More
Cybersecurity advisor at the table in front of laptop
Cyber SecurityInsights

Your Organization May Need a Cybersecurity Advisor: Here’s What To Consider

September 20, 2021
A trusted cybersecurity advisor is the gateway to a security-first mindset within a business -- you just need to know where to start and what to look for before engaging with such services.
Read More
Data streams in the data center showing use of storage virtualization
Cyber SecurityInsights

How Object Storage Is Taking Storage Virtualization to the Next Level

October 7, 2020
Storage virtualization 2.0 offers organizations the ability to better manage both structured and unstructured data, along with the added benefit of greater protection against data loss.
Read More
Virtual lock and key in front of hands typing on the laptop keyboard
Cyber SecurityInsights

Three Keys to a Successful Zero-trust Implementation

March 21, 2022
The quick transition to the Zero-Trust model is mainly fueled by remote work, cloud adoption and an increase in deploying devices in recent years. Having the right security solutions to support a Zero-Trust strategy is critical. Here are three keys to implement a Zero-Trust approach successfully.
Read More
View of Palermo at sunset showing ransomware attack disrupted municipal services
Cyber SecurityNews

Ransomware Attack Disrupted Municipal Services in the Italian City of Palermo

June 16, 2022
Ransomware attack on Palermo city disrupted municipal services including video surveillance management, municipal police operations, online bookings, and digital communication channels.
Read More
Teenage girls using smartphones showing the India ban on Chinese apps due to national security reason
Cyber SecurityNews

Citing National Security, India Bans Dozens of Chinese Apps in Wake of Border Skirmishes

July 13, 2020
Indian government has cited national security as the reason for banning 59 Chinese apps, including popular apps such as TikTok, UC Browser and Clash of Kings.
Read More
Close-up back view of tired frustrated doctor in blue medical uniform showing ransomware attack
Cyber SecurityNews

Ransomware Attack on Springhill Medical Center Leads to a Negligent Homicide Investigation After a Baby Dies

October 7, 2021
Lawsuit alleges that Springhill Medical Center was responsible for the death of a baby after ransomware attack prevented doctors from monitoring the baby's heartbeat during delivery.
Read More
Europe map on digital display with reflection and pixels showing cyber response to security incidents
Cyber SecurityNews

European Union Proposes a Joint Cyber Response Unit To Coordinate Reaction to Security Incidents

July 5, 2021
The EU Cybersecurity Commission will create a Joint Cyber Response Unit to coordinate response to security incidents, share information, forewarn members and increase resiliency.
Read More
Modern graphic interface shows business information indicating cybersecurity trends
Cyber SecurityInsights

Cybersecurity Trends to Know in 2020

March 12, 2020
In this guide, we look at some of the cyber security trends and latest innovations that are helping companies to defend themselves against cyber attacks in 2020.
Read More
1 … 136 137 138 139 140 … 163

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results