CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Hand with smart phone and laptop doing online shopping showing the account takeover fraud problem
Cyber SecurityInsights

Account Takeover Fraud Is the New Normal … You Can Fight It Without Losing Good Customers

January 23, 2019
Account takeover fraud is on the rise, and businesses and banks are bearing the costs. Because ATO fraud looks like activity by a trusted customer, detection can be difficult – but it is possible. Here's what businesses need to know to fight takeover attacks without declining good orders.
Read More
House of Representatives at Australia's Parliament House passing controversial encryption laws
Cyber SecurityNews

Controversial Encryption Laws in Australia Could Set Dangerous Worldwide Precedent

January 22, 2019
At the end of 2018, Australia became the first nation in the world to enact encryption laws requiring companies to provide access to encrypted communications. Will other nations around the world soon follow suit?
Read More
Human hand on the keyboard of notebook in the darkness. showing cyber fraud by Chinese hackers
Cyber SecurityNews

Cyber Fraud by Chinese Hackers Makes Headlines in India

January 21, 2019
Chinese hackers have just pulled off one of India’s biggest cyber fraud ever by convinceing the head of a local Indian subsidiary of an Italian firm to wire $18.6 million from bank accounts in India to a bank account in Hong Kong.
Read More
Hook picking up a lock showing phishing scams on computer system
Cyber SecurityResources

How to Protect Your Business from Phishing Scams

January 18, 2019
According to a recent report, 90% of all data breaches can be traced back to phishing attacks. How can businesses effectively protect themselves from this damaging cybercrime?
Read More
Business man standing on the sea in the middle of storm showing cyber insurance may not cover cyber war
Cyber SecurityNews

Cyber Insurance Not Valid in Case of Cyber War, Says Major Insurance Company

January 17, 2019
In what is shaping up to be a major test case for the entire cyber insurance industry, Zurich Insurance is refusing to pay out a $100 million claim from Mondelez, saying that the ransomware attack was actually an act of “cyber war,” and therefore, is not covered by the policy.
Read More
Skyline of Ho Chi Minh with Saigon River, looking into the future with Vietnam's controversial new cyber law and freedom of speech
Cyber SecurityNews

Vietnam’s Controversial New Cyber Law Could Entangle Google and Facebook in a Battle Over Freedom of Speech

January 14, 2019
Vietnam’s controversial new cyber law went into effect on Jan 1, 2019. Google and Facebook has reason to be cautious about entering into what could easily become a global discussion over freedom of speech.
Read More
Hands of hacker in dark room showing need for identity theft protection services
Cyber SecurityInsights

Identity Theft Protection Services Evolve in Digital Convenience Era Vulnerable to ID Fraud

January 11, 2019
The threats posed by identity theft are not lost on organizations and identity theft protection services are expected grow over 11% and generate revenues worth over US$ 8.2 billion in 2019.
Read More
Man businessman in office and victim of CEO fraud
Cyber SecurityInsights

CEO Fraud and Santa Clause

January 9, 2019
Phishing attacks known as CEO Fraud or Business Email Compromise are affecting the bottom line of companies and are devastating because the spoof emails have all the appearances of being real, and the victims voluntarily hand over the money.
Read More
Cybersecurity talent waiting for job interview as part of hiring process
Cyber SecurityInsights

Having Trouble Finding Cybersecurity Talent? The Problem Might Be Your Hiring Process

January 2, 2019
Like it or not, there is a cybersecurity talent shortage. But whether or not that skills gap is catastrophic or inconvenient for your business is entirely up to you.
Read More
Lawyer counseling and giving advice about cybersecurity compliance for cybersecurity and privacy legislation
Cyber SecurityInsights

Driving Cybersecurity Compliance

December 20, 2018
When it comes to cybersecurity and privacy legislation, many organizations around the world are playing catch-up. Proper information governance can help with cybersecurity compliance.
Read More
1 … 155 156 157 158 159 … 171

Latest

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results