CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Image of hand putting CD in the tray of a laptop signifying the difficulty to know where your data is
Cyber SecurityInsights

It’s 2018, Do You Know Where Your Data Is?

April 16, 2018
Anyone dealing with critical information should pay attention to the data they handle, how they are accessing it, and where it originated. The idea is to maintain the integrity of the data and the chain of custody, which is a concept that involves the strict ownership and control over the item in question.
Read More
Image of man using finger to control futuristic display sirnifying use of cyber security automation to battle against hackers
Cyber SecurityInsights

Cyber Security Automation Is One Key Factor in Winning the Battle Against Hackers

April 5, 2018
Given a shortage of skilled cyber security manpower, one of the most attractive alternatives may be cyber security automation. In a new report from McAfee, 81% of those surveyed said they would be more successful in their jobs and have more time to focus on higher value-added tasks if they had greater automation.
Read More
Image of lock on network cables on top of keyboard showing need for network security
Cyber SecurityInsights

What You Should Already Be Doing for Your Network Security

April 4, 2018
Almost daily, we hear about another well-known company experiencing a data breach. While no set of steps can guarantee that your company will be 100 percent safe from hacking, implementing these steps will bolster your company’s security posture and help to protect the network from cyber-attacks.
Read More
Image of lock on hard disk signifying data protection against ransomware attack
Cyber SecurityInsights

Ransomware Attack of 2018 Isn’t Coming – It Has Arrived

April 2, 2018
The ransomware threat landscape continues to evolve and the spreading mechanism has changed, shifting from simple phishing attacks, spam and drive-by-downloads to more sophisticated techniques. These advanced techniques in ransomware has proven successful in massive global attacks for 2017. What's coming in 2018?
Read More
Image of man in hard hat holding a bitcoin signifying cryptocurrency scams using celebrity twitter accounts
Cyber SecurityInsights

Beware the Latest Cryptocurrency Scams Involving Celebrity Twitter Accounts

March 28, 2018
As prices of cryptocurrencies continue to skyrocket, fraudulent cryptocurrency scams are on the rise. Twitter cryptocurrency scams impersonating celebrities or influencers are so popular with cryptocurrency thieves and hackers simply because they are so easy to pull off on a daily basis.
Read More
Image of house made of dollar notes on fire signifying impact of cybersecurity incidents on financial institutions
Cyber SecurityInsights

The Impact of Cybersecurity Incidents on Financial Institutions

March 26, 2018
The only guarantee today is that nefarious parties will continue to find new ways to infiltrate networks at financial institutions. Therefore, we must implement best practices to protect against cybersecurity incidents, as well as to resolve all possible issues that can arise should a cyberattack occur.
Read More
Image of gloved hand holding mobile phone showing login screen signifying Fakebank Android malware and the threat of vishing attacks
Cyber SecurityNews

Fakebank Android Malware Evolves into Vishing Attack

March 23, 2018
Latest variant of Fakebank Android malware adds even more functional threats to banking clients – in the form of ‘vishing’ (voice phishing). It can now intercept outgoing and incoming calls which is then redirected to scammers which allows them to pose as legitimate employees of the bank.
Read More
Image of four interview candidates sitting in a row signifying churn in cyber security jobs and how that makes it harder to fight cyber crime
Cyber SecurityInsights

Churn in Cyber Security Jobs Makes It Harder to Fight Cyber Crime

March 14, 2018
The bubble in cyber security jobs is encouraging people to look for better opportunities at exactly the wrong time, and that may lead to the detriment of the fight against cyber crime. A new report by (ISC)2 found that a staggering 84% of cyber workers are open to new opportunities or plan to change employers in 2018.
Read More
Image of waves crashing on rocks around lighthouse signifying the waves of DDoS attack and the different attack vectors
Cyber SecurityInsights

DDoS Attack Glossary: Top 12 Attack Vectors

March 7, 2018
Because of the significant damage a DDoS attack can cause, many IT teams will put protecting against the threat high on their agenda. However, what many IT teams may be completely unaware of is that there are a wide variety of different types of DDoS attack vectors in a cybercriminals’ arsenal.
Read More
Image of man holding magnifying glass signifying executive taking care of business using a security to-do list
Cyber SecurityInsights

Are You Takin’ Care of Business? Your Security To-Do List

March 5, 2018
Don’t wait for cybercrime to find you - remember that the best defense is always a good offense. Be a cybersecurity rock star. Just like any musician, you’ll have your big hits and your flops. But when you can see where you're going, with the right visibility into your systems, you will be TCB, takin’ care of business.
Read More
1 … 162 163 164 165 166 … 171

Latest

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results