CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Close up female hand using mobile apps
Cyber SecurityInsights

Preventing Hackers From Transforming Apps Into Trojans

October 12, 2020
Hackers are reverse engineering mobile apps and embedding malicious code to steal data for downstream attacks or to cause other direct harm to the user.
Read More
Fish hook with keys on computer circuit board showing phishing and need for security awareness
Cyber SecurityInsights

What To Do When Your Organization Become the Victim of a Phishing Attack

July 20, 2021
Knowing the common manipulative tactics – exploiting every emotional hot button (anxiety, uncertainty, urgency) – used in phishing is the first step to understanding how to identify and deflect them; and it requires a repetitive process.
Read More
Man pointing at virtual locks showing validation-in-depth
Cyber SecurityInsights

Putting Validation-in-Depth at the Center of Your Organization’s Security Posture

November 26, 2021
Organizations need a new security approach designed for the modern world that automatically validates security for continuous resilience instead of assuming Defense in Depth is accurate. Every Defense-in-Depth design requires Validation-in-Depth at its core.
Read More
Russian state-owned telecommunications provider Rostelecom sign on the facade of building showing BGP hijacking of internet traffic
Cyber SecurityNews

Russian Rostelecom Compromises Internet Traffic Through BGP Hijacking

April 16, 2020
In a recent BGP hijacking incident, internet traffic meant for 200 major networks, content delivery networks and cloud providers were redirected through Russian state-owned telecommunications provider, Rostelecom.
Read More
Woman in front of modern graphic interface showing data ecosystem and data governance
Cyber SecurityInsights

How the Modern Data Ecosystem Broke Data Governance

May 18, 2022
Technologies have helped creating a comprehensive modern data ecosystem deliver data value easier and faster may have made data governance and protection appear more difficult.
Read More
Image showing doctor speaking to patient
BlogsCyber SecuritySecurity Demystified

My Quest to end my Woes ends in a nought Outcome!

January 11, 2018
Innovative healthcare technology solutions are raising serious security and privacy concerns. And that has to be addressed. It needs to start with patient advocacy and transparency. And stricter regulations that can be tested by the patients.
Read More
Image of firemen putting out a fire representing data breach response
Cyber SecurityInsights

Standardising Data Breach Response Plan – The State of the Art

November 25, 2016
In this article, we examine the role of International Standards Organization (ISO) standards, and how standards are important for an incident and data breach response plan.
Read More
Man in control room monitoring multiple cameras showing cyber-physical security as part of enterprise security
Cyber SecurityInsights

Top 5 Enterprise Security Threats and How To Avoid Them

September 13, 2021
With much of the focus on cybersecurity practices, however, organizations are often overlooking their physical security needs. What are the common cyber-physical security threats to enterprises?
Read More
Tiananmen Square in Beijing showing concern with China's Social Credit System
Cyber SecurityInsights

How China’s Social Credit System Will Erode Privacy in the West

February 22, 2019
By now, the Social Credit System that the Republic of China has been planning to implement since 2014 is known about across the globe. If you think the Western world is miles apart from taking measures even remotely similar to the SCC in China, then you’re dead wrong.
Read More
Hands building tower with wooden blocks showing how companies should carry out effective vendor risk management
Cyber SecurityInsights

The Secret Ingredient for Effective Vendor Risk Management

May 29, 2019
It’s a reality that companies are outsourcing almost every aspect of their operations thus effective vendor risk management is becoming more crucial, how should you do it?
Read More
1 … 163 164 165 166 167 … 171

Latest

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results