CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Woman holding mobile phone with TikTok logo on screen showing the TikTok security flaws which may allow hackers to steal personal data
Cyber SecurityNews

TikTok Security Flaws May Have Allowed Hackers to Steal Personal Data

January 17, 2020
Recently discovered TikTok's security flaws make it possible to spoof the source of SMS messages, alter people's feeds and accounts, and also access sensitive personal information via API calls.
Read More
Image of mobile phone with privacy login screen showing the need for Instagram two-factor authentication
Cyber SecurityNews

Time to Turn on That Instagram Two-Factor Authentication

September 6, 2017
With six million Instagram accounts hacked, are passwords now a liability and is it time to turn on that Instagram two-factor authentication?
Read More
Large hangar warehouse showing ransomware attack on Toll Group
Cyber SecurityNews

Toll Group’s Operations Shut Down by Yet Another Ransomware Attack

May 14, 2020
Second ransomware attack on Toll Group in three months shows lightning can strike twice, and there's no grace period that's honored before the next attack.
Read More
Graphics card with a row of fans showing malicious code
Cyber SecurityNews

Toolkit To Hide and Execute Malicious Code on Nvidia, AMD and Intel Graphics Cards Sold by a Hacker Online

September 10, 2021
A threat actor sold for an undisclosed amount a toolkit to conceal and execute malicious code without detection on most graphics cards, including AMD, Nvidia, and Intel.
Read More
Skull icon with padlock icons showing the top 10 ransomware stories in 2019
Cyber SecurityInsights

Top 10 Ransomware Stories of 2019

December 27, 2019
2019 marks a year of escalated ransomware attacks especially on large companies and public institutions in the U.S. What are some of the biggest stories frequently quoted in the press?
Read More
Man in control room monitoring multiple cameras showing cyber-physical security as part of enterprise security
Cyber SecurityInsights

Top 5 Enterprise Security Threats and How To Avoid Them

September 13, 2021
With much of the focus on cybersecurity practices, however, organizations are often overlooking their physical security needs. What are the common cyber-physical security threats to enterprises?
Read More
Business man shows protected cloud software
Cyber SecurityInsights

Top 5 Risks With Cloud Software and How to Mitigate Them

December 31, 2021
While providers are doing their best to ensure the security and integrity of their cloud software, there are also some steps that businesses can take to mitigate any cloud-associated risks. Let’s take a look at some of the most important things to consider when it comes to cloud-based platforms and risk mitigation.
Read More
Man tapping on virtual gear mechanism showing security considerations for cloud migration
Cyber SecurityInsights

Top 5 Security Considerations for Cloud Migration

August 4, 2020
Cloud-based deployments have significantly changed the security paradigm and the foremost consideration for cloud migration involves a security framework that spans the entire cloud infrastructure.
Read More
Hands holding a digital padlock showing endpoint security practices for stopping cyber attacks
Cyber SecurityInsights

Top Endpoint Security Recommendations for CISOs To Stay One Step Ahead of Cyberattacks

May 31, 2021
Here are the top cyber hygiene routines all CISOs should embrace in their daily network care routines to stay ahead of cyber attacks.
Read More
Hacker holding money after successful attack showing ban of ransomware payments
Cyber SecurityNews

Top FBI Official: Banning Ransomware Payments Won’t Make the Situation Better

August 6, 2021
There has been considerable debate about banning ransomware payments as a means of curbing the explosive growth of the crime Assistant director of the FBI's cyber division weighed in, suggesting that it would create a new avenue of extortion.
Read More
1 … 137 138 139 140 141 … 158

Latest

Young man looking at laptop computer in the dark showing Great Resignation increased risks of intellectual property theft

How To Protect Company IP During the Great Resignation

Market price display at street in the night showing RTB adtech exposing online behavior data

Report on RTB: Adtech “Biggest Data Breach Ever Recorded,” Online Behavior More Exposed in Countries Without Privacy Regulations

Security researchers working together in front of computer monitors showing DOJ rules on CFAA

DOJ Rules “Good Faith” Security Researchers Will No Longer Be Prosecuted Under CFAA

Man typing on laptop with login and lock showing privileged access management

Why Fortune 1000 Organizations Aren’t Thinking About Privileged Access Management the Right Way

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results