CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Employees brainstorming in meeting showing the need for marketers to know about cybersecurity and work with IT team
Cyber SecurityInsights

What Marketers Need to Know About Cybersecurity

June 5, 2019
As more and more marketers leverage on customer data to build target consumer base, it’s time for CMOs and marketing teams to get to know cybersecurity and focus on cyber risks too.
Read More
Programmer working on computer showing the cavalier technology approach in the new voting app for Iowa caucus
Cyber SecurityInsights

What the Iowa Caucus Tells Us About Cavalier Approaches to Technology

February 13, 2020
A haphazard technology roll-out of a new voting app led to tech issues that delayed the Iowa caucus results and threw the public into states of confusion and frustration.
Read More
Soldier working with a laptop computer showing CMMC for DoD contractors
Cyber SecurityInsights

What the New CMMC 2.0 Rule Change Means for DoD Contractors

January 25, 2022
New CMMC 2.0 pares down the scope of the original requirements, allowing greater flexibility and relaxing the rules for DoD contractors and subcontractors who do not directly handle sensitive or classified information.
Read More
Fish hook with keys on computer circuit board showing phishing and need for security awareness
Cyber SecurityInsights

What To Do When Your Organization Become the Victim of a Phishing Attack

July 20, 2021
Knowing the common manipulative tactics – exploiting every emotional hot button (anxiety, uncertainty, urgency) – used in phishing is the first step to understanding how to identify and deflect them; and it requires a repetitive process.
Read More
Girl looking at the stars with telescope beside her showing what to expect in 2019
BlogsCyber SecurityPrivacy Intelligence

What to Expect in 2019

January 25, 2019
One of my clients recently asked me what organizations should expect for information security and privacy in 2019. My short answer: More! Here is what to expect in five key areas in 2019, and beyond.
Read More
Closeup shot of one bitcoin over graphic video card showing account security for cryptocurrency
Cyber SecurityInsights

What US$10M in Losses Each Day Tells Us About Cryptocurrency Account Security

November 30, 2021
Cryptocurrency exchanges need to empower users to fully secure their accounts to protect themselves from phishing attacks and account takeovers. Account security using modern authentication standards can achieve this without sacrificing user convenience and privacy.
Read More
Tim Hortons logo in front of one of their restaurants in Toronto
Cyber SecurityInsights

What We Can Learn from the Tim Hortons Mobile Privacy Debacle

June 10, 2022
The Tim Hortons coffee chain became a cherished Canadian institution over nearly 60 years in business. However, questionable mobile app privacy practices tarnished the brand and now have the company facing the wrath of regulators and customers.
Read More
Image of smart city with overlay of network connections signifying IoT network and how the new NIST report will address security and privacy
Cyber SecurityNews

What You Need To Know About the New NIST Report on IoT

February 26, 2018
For years, IoT developers have focused too much on availability, and not enough on privacy and confidentiality. This mindset appears to be shifting and the NIST report is proof of a growing recognition that there needs to be universal standards in place to improve the privacy and security of any IoT system.
Read More
Image of lock on network cables on top of keyboard showing need for network security
Cyber SecurityInsights

What You Should Already Be Doing for Your Network Security

April 4, 2018
Almost daily, we hear about another well-known company experiencing a data breach. While no set of steps can guarantee that your company will be 100 percent safe from hacking, implementing these steps will bolster your company’s security posture and help to protect the network from cyber-attacks.
Read More
Elderly man holding credit card in scam call showing cost of fraud
Cyber SecurityInsights

What’s the Total Cost of Fraud — And How Can You Reduce It?

September 10, 2021
To reduce Total Cost of Fraud (TOCF), organizations must take a more holistic approach that considers the hidden costs of fraud to help minimize the cumulative financial impact and deliver better ROI for your fraud prevention efforts.
Read More
1 … 161 162 163 164 165 … 171

Latest

Man looking at SMS on phone showing robotext scams and smishing attacks

FCC Warns About Increased Robotext Scams From Automated Smishing Attacks

Twitter logo on mobile phone screen showing Twitter API keys used for account hijacking

Thousands of Mobile Apps Are Leaking Twitter API Keys, Could Be Used for Account Hijacking

Doctor monitoring patient using medical devices showing internet of medical things

Internet of Medical Threats? Exploring Bluetooth Low Energy Vulnerabilities in Medical Devices

Hand holding credit card showing remote control compromise of payment terminals

Hackers Reportedly Exploited Wiseasy’s Remote Control Dashboards to Compromise 140,000 Payment Terminals Worldwide

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results