Data loss can result in catastrophe and leave companies and individuals completely vulnerable, what are the different ways that it can occur and what can you do to prevent it?
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Two competing visions of the future of cyber governance presented at UN with views between “state sovereignty” backed by Russia and China, and “free, open and secure” backed by U.S. and its allies.
With the growth in BYOD, mobile messaging and a mobile workforce, companies should make it a priority to provide secure communications for data security and compliance.
Hogan Lovells’ report surveyed 550 international business decision-makers and found that their organizations are usually not prepared for legal issues arising from technology risks.
U.S. government agencies warned of new wave of password spraying attacks with Citrix serving as one of the latest victims of such “low and slow” hacking campaigns.
New malware Ramsay was found to specifically target air-gapped networks by laying low and inactive in infected files until it is connected to the intended target.
Portuguese energy company EDP suffered a ransomware attack by hacking group Ragnarok who threatened to dump 10TB of stolen data if the company does not pay a ransom of $10.9 million.
Data breach of a popular online kids' game exposed personal details of 46 million users. The threat actor released 7 million records for free on a hacker forum.
A data breach that exposed usernames and passwords of 28,000 GoDaddy web hosting accounts had raised security concerns over the authentication methods being used.
Remote work has put more pressure on the technology that companies have in place. What is important heading into 2021 is that we look at what went well, what has to change, and what lessons we can learn.