CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Hacker working on laptop showing the five ways to prevent Capital One Breach from happening to organizations
Cyber SecurityInsights

Five Ways to Prevent the Capital One Breach from Happening to You

August 6, 2019
A poorly configured Amazon cloud database resulted in the Capital One breach exposing information of 106 million U.S. and Canadian customers and applicants. What are the five steps that organizations can take to prevent such attacks?
Read More
Intersection of Broad Street and Wall Street showing the George Washington Statue overlooking the New York Stock Exchange
Cyber SecurityInsights

Follow the Leader: NYDFS Cybersecurity Regulation Leads the Way for Other States and Industries

July 16, 2018
The New York Department of Financial Services (NYDFS) Cybersecurity Regulation blazed a trail in 2017, forming the basis for similar laws for other industries in other states. Currently, the regulation serves as a useful model for managing cybersecurity risks, regardless of industry.
Read More
Storage rack in data centre showing third party data breach of 90 hotels’ security logs
Cyber SecurityNews

Third Party Data Breach to Blame for Data Leaks of Major Hotel Chains

June 10, 2019
About 90 major hotels and resorts worldwide had their security logs exposed in a third party data breach. Source of the breach is ironically from their management company's intrusion detection system.
Read More
Hacker pointing finger at laptop screen showing ransomware via social engineering
Cyber SecurityNews

Nigerian Threat Actors Skip Social Engineering, Make Direct Pitches to Employees To Install Ransomware on Company Networks

August 25, 2021
Most ransomware attacks begin with some combination of phishing and social engineering. An enterprising ransomware gang in Nigeria appears to be skipping this messy step, simply making a direct pitch to employees to join in on the attack.
Read More
Image of waves crashing on rocks around lighthouse signifying the waves of DDoS attack and the different attack vectors
Cyber SecurityInsights

DDoS Attack Glossary: Top 12 Attack Vectors

March 7, 2018
Because of the significant damage a DDoS attack can cause, many IT teams will put protecting against the threat high on their agenda. However, what many IT teams may be completely unaware of is that there are a wide variety of different types of DDoS attack vectors in a cybercriminals’ arsenal.
Read More
Aerial view of power station showing Lazarus hackers cyber espionage using log4j vulnerability
Cyber SecurityNews

Log4j Vulnerability Exploited by Lazarus Hackers for Cyber Espionage; Targets Are Energy Companies Running VMware Horizon Servers

September 16, 2022
The Lazarus hackers are generally in pursuit of profit. But in this case, the main interest appears to be cyber espionage. A report indicates that the group is targeting the Log4j vulnerability in energy companies.
Read More
Padlock with metal chain hooked and locked across computer keyboard showing ransomware attacks through employee phishing
Cyber SecurityNews

Ransomware Attacks Evade Strong Cyber Defenses While Phishing Remains an Easy Initial Entry Point Despite Employee Training

July 23, 2021
Report found that most organizations that suffered successful ransomware attacks since 2019 had perimeter defenses in place and had trained their employees on phishing.
Read More
Man standing puzzled among hanging hooks showing potential uptick in phishing attacks with millions of Facebook users’ phone numbers exposed in recent data breach
Cyber SecurityNews

Will Exposed Phone Numbers Cause an Uptick in Phishing Attacks, SIM Swaps and Spam?

September 17, 2019
419 million Facebook users are vulnerable to phishing attacks, SIM swaps and spam with their phone numbers exposed through a number of online databases found without password protection.
Read More
Woman holding mobile phone showing Facebook user data exposed via Telegram bot
Cyber SecurityNews

Hacker Sells Data for 500 Million Facebook Users Through Telegram Bot

February 5, 2021
Hacker created a Telegram bot to sell information belonging to 533 million Facebook users. Buyers could search users' mobile numbers using account IDs or vice versa.
Read More
Attack traffic targeting nation state showing cyber insurance coverage of cyber attacks
Cyber SecurityNews

Lloyd’s of London: Cyber Insurance Will Not Cover Cyber Attacks Attributable to Nation-States

December 8, 2021
Lloyd’s of London has issued a bulletin indicating that its cyber insurance products will no longer cover the fallout of cyber attacks exchanged between nation-states. This definition extends to operations that have "major detrimental impact on the functioning of a state."
Read More
1 … 139 140 141 142 143 … 200

Latest

Chick-fil-A restaurant showing privacy lawsuit over data collection

Chick-fil-A Hit With Privacy Lawsuit Over Data Collection Embedded in Viral Video Marketing Campaign

Man pointing at HR icons showing AI use in HR processes

AI in HR – How To Make Use of the New Hype in a Compliant Manner

Privacy’s Shifting Left: Are You Ready To Move?

Airline passengers in an international airport showing no fly list in data leak

Wanted Hacker Accessed Federal No Fly List on an Unsecured Airline’s Server

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results