Supply chain security is a hot issue for enterprises with increasing third party data breaches. Recent (ISC)² study indicates these breaches are more likely the fault of a large enterprise partner than a small one.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Russia has been making news for hacking utility systems in other nations and for a change, news has emerged that U.S. is conducting cyber attack on power grid in Russia by planting malicious code.
Medical companies affected by AMCA healthcare data breach have begun alerting investors and shareholders which may cause them to lose tens of millions of dollars in stock market valuation.
A good cybersecurity policy not only protects your business against cyber threats but can also tell you what to do when face with cyber attacks. What should be included when developing one?
One key finding from CNCERT report shows most cyber attacks are using U.S. servers to implant viruses and carry out botnet attacks against Chinese computer assets.
Recent 2019 ISACA annual report shows key interesting cyber security trends which includes underreporting of cyber crimes and internal employees being the third-greatest security threat.
Data breach of U.S. Customs and Border Protection agency’s subcontractor has exposed around 100,000 travelers’ images which further highlight the importance of vendor security compliance.
Polymorphic phishing attacks are highly effective as they use randomization of email components which are hard to be detected by signature-based email security tools.
40% of Dark Net vendors are selling targeted hacking services designed for Fortune 500 and FTSE 100 companies, from stolen credentials to custom malware to infiltrate bank ATMs.
The best cybersecurity solutions and security training program for your employees won’t be complete without a penetration test to check for possible exploitation points. What makes up a good penetration test?