CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Random
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

A broken pipe leaking water showing how data loss can occur
Cyber SecurityInsights

How Can Data Loss Occur? The Answers Might Surprise You

May 14, 2020
Data loss can result in catastrophe and leave companies and individuals completely vulnerable, what are the different ways that it can occur and what can you do to prevent it?
Read More
People sitting in conference hall showing cyber governance issues take on high-profile status at the United Nations
Cyber SecurityInsights

Cyber Governance Issues Take on High-Profile Status at the UN

October 14, 2019
Two competing visions of the future of cyber governance presented at UN with views between “state sovereignty” backed by Russia and China, and “free, open and secure” backed by U.S. and its allies.
Read More
Woman using smart phone in the night showing how companies should ensure secure communications with the growth in BYOD at workplace
Cyber SecurityInsights

New Working Norms Make Securing the Communications Channel a Top Priority

March 31, 2020
With the growth in BYOD, mobile messaging and a mobile workforce, companies should make it a priority to provide secure communications for data security and compliance.
Read More
Smartphone and judges gavel on table showing technology risks
Cyber SecurityNews

Majority of Businesses Unprepared for Reputational Damage and Lawsuits Stemming From Technology Risks

February 1, 2021
Hogan Lovells’ report surveyed 550 international business decision-makers and found that their organizations are usually not prepared for legal issues arising from technology risks.
Read More
Open red padlock on a padlock background showing the rise of password spraying attacks warned by feds
Cyber SecurityInsights

Feds Warn Password Spraying Attacks on the Rise

May 21, 2019
U.S. government agencies warned of new wave of password spraying attacks with Citrix serving as one of the latest victims of such “low and slow” hacking campaigns.
Read More
Engineer standing on industry grounds showing the new malware that targets air-gapped networks
Cyber SecurityNews

Are Air-Gapped Networks Enough to Stop Malware? They Might Not Be for Long

May 26, 2020
New malware Ramsay was found to specifically target air-gapped networks by laying low and inactive in infected files until it is connected to the intended target.
Read More
Building front of Portuguese energy company EDP showing how the ransomware attack demonstrates the increasing trend towards public leaking of sensitive information
Cyber SecurityNews

Ransomware Attack on Portuguese Energy Company EDP Shows Increasing Trend Toward Public Leaking of Sensitive Information

April 29, 2020
Portuguese energy company EDP suffered a ransomware attack by hacking group Ragnarok who threatened to dump 10TB of stolen data if the company does not pay a ransom of $10.9 million.
Read More
Two boys playing with tablet on the bed showing data breach of online kids' game
Cyber SecurityNews

Data Breach of Online Kids’ Game Exposed Personal Data of 46 Million Parents and Children

November 20, 2020
Data breach of a popular online kids' game exposed personal details of 46 million users. The threat actor released 7 million records for free on a hacker forum.
Read More
Hacker typing on a login screen showing the data breach of GoDaddy web hosting accounts calls for a need for stronger authentication
Cyber SecurityNews

GoDaddy Web Hosting Accounts Data Breach Underscores Need for Stronger Authentication

May 20, 2020
A data breach that exposed usernames and passwords of 28,000 GoDaddy web hosting accounts had raised security concerns over the authentication methods being used.
Read More
Young business woman in medical mask working from home showing impact of remote working on identity management
Cyber SecurityInsights

Conditional Access – How To Support Remote Working and Identity Management

January 21, 2021
Remote work has put more pressure on the technology that companies have in place. What is important heading into 2021 is that we look at what went well, what has to change, and what lessons we can learn.
Read More
1 2 3 4 … 157

Latest

Board members sits at a table in a meeting room showing personal liability

Personal Liability for Directors Who Disregard Cybersecurity

Police car with roof mounted strobe lightbar showing law enforcement data breach

Data Breach on DEA Law Enforcement System Grants Cyber Criminals Access to 16 Databases

VPN logo on smartphone lying on laptop showing VPN providers to hand over customer data

VPN Providers Ordered by Indian Government To Hold All Customer Data for Five Years, Hand Over to Government Upon Request

National Stadium and residential buildings with mountains in the background in San Jose, Costa Rica showing Conti ransomware

Could a Cyber Attack Overthrow a Government? Conti Ransomware Group Now Threatening To Topple Costa Rican Government if Ransom Not Paid

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results