It’s not enough to just keep up to speed with the latest cyber threats as it’s the unknowns which threaten company data assets, so what do we do about the unknowns?
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Protecting your client’s private information is crucial for a business, learn more about security measures to prevent data breach and guarantee safety of information in the online world.
Meet Bob. Bob’s an employee at BigCorp, and he’s confused. He’s got info security folks requiring him to take annual...
U.S. government agencies warned of new wave of password spraying attacks with Citrix serving as one of the latest victims of such “low and slow” hacking campaigns.
Latest 2019 Verizon data breach report highlights absence of foundation-level and layered security controls, internal security discipline, and general security awareness as the common denominators in the data breach dilemma.
Chinese spies known as Buckeye group are alleged to be using some of the NSA cyber weapons as early as March 2016, long before Shadow Brokers released them in April 2017.
Cybersecurity vacancies are hard to fill as companies are hiring from a pool which is not growing quick enough to meet demand, a phenomenon attributed to growing cybercrime economy and lack of extensive education to produce professionals.
Major anti-malware vendors, Symantec, McAfee, and Trend Micro, allegedly had their source code stolen by Russian hackers. The full set of data including access to the companies' networks are now going on sale for $300,000.
New Atlantic Council report by two former Department of Defense officials suggests that active cyber defense would represent a welcome compromise between doing nothing and going on the offensive.
Israel's cyber response to cyber attacks launched by Hamas was to launch an air strike on a building known to be the cyber HQ for Hamas. It is believed to be the first time any military has responded to a digital threat with immediate force.