CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Picture of Microsoft building showing a Microsoft data breach which exposed 250 million customer service records
Cyber SecurityNews

250 Million Microsoft Customer Service Records Exposed; Exactly How Bad Was It?

February 3, 2020
Microsoft announced a breach where they uncovered misconfigured security rules in one internal database that exposed 250 million customer service records for almost whole of December.
Read More
Man using phone and laptop with lock and keypad for authentication and password management
Cyber SecurityInsights

3 Authentication Strategies Organizations Need for Cybersecurity Today: Enterprise Password Management and Beyond

June 2, 2022
While organizations should prepare for a passwordless authentication-based future, in the interim, companies need to implement a strategy that utilizes as few passwords as possible, including products such as a password manager for business, federation, and privileged access management (PAM).
Read More
Thoughtful young man typing on laptop showing working from home and hybrid workplace
Cyber SecurityInsights

3 Cybersecurity Lessons for Working-From-Home as Enterprises Prepare for New Hybrid Era

September 28, 2021
Shift to remote working has contributed to an unrelenting cybersecurity emergency. Here are three cybersecurity lessons from the pandemic that every organization should learn as they prepare for the future of hybrid work.
Read More
Group of surgeons working in surgical theatre showing the email security setbacks unique to healthcare
Cyber SecurityInsights

3 Email Security Setbacks Unique to Healthcare

August 14, 2019
Phishing is a massive cyber security threat and very much still plagues the healthcare industry. What are the email security setbacks faced by the healthcare providers which make them vulnerable?
Read More
Fishing hook on computer keyboard showing anti-phishing information security policies
Cyber SecurityInsights

3 Information Security Policies To Help Create a Strong Anti-phishing Foundation

March 11, 2022
No matter how boring or clichéd this might sound, information security policies and procedures are the pillars successful organizations are built on, setting the stage for a sound security culture and helping to create a foundation for a truly resilient organization.
Read More
Padlock on keyboard showing the three reasons that stop companies from getting rid of passwords
Cyber SecurityInsights

3 Reasons Why Companies Don’t Get Rid of Passwords – But Should

July 9, 2020
Passwords are becoming more of a liability than the security asset they were intended to be. Should companies consider passwordless technologies for better benefits and cost savings?
Read More
Payment transaction with mobile showing the three reasons to prioritize PCI compliance
Cyber SecurityInsights

3 Reasons Why You Should Prioritize PCI Compliance Now

June 24, 2020
Focusing on PCI compliance is a good way to improve risk management, find out what your company can do to reduce incidents, stop cyber threats and prevent regulatory fines.
Read More
Man looking at business results on virtual screen showing business resilience
Cyber SecurityInsights

3 Ways CIOs Can Embed Resilience in Their Business

June 11, 2021
The COVID-19 pandemic presented a moment of truth for companies in business resilience. The need for digital-first businesses that are customer-centric, data-driven, and deliver fast time to value which was an option is now an imperative.
Read More
Team members removing wooden blocks from a tower showing third party risk management
Cyber SecurityInsights

3 Ways To Improve Board-Level Focus on Third-Party Risk Management

March 9, 2021
Corporate boards are increasingly concentrating on cybersecurity issues. Here’s how to ensure they focus on third-party risk, too.
Read More
Night market roof top showing the three ways to protect yourself on marketplace platforms
Cyber SecurityInsights

3 Ways to Protect Yourself on Marketplace Platforms

June 3, 2020
Fraudsters are taking advantage of recent increased use of marketplace platforms to run cybercrime, what can you do to prevent yourself from becoming victim of identity theft?
Read More
1 2 3 4 5 6 … 165

Latest

Yodel delivery Service logo sign showing cyber incident suspected ransomware

Yodel Parcel Delivery Service Disrupted by a Suspected Ransomware Cyber Incident

Hacker exploit vulnerability Log4Shell on VMware servers

CISA and Coast Guard Cyber Command Warn About Hackers Leveraging Log4Shell Vulnerability on VMware Servers

Finger pointing at digital lock showing privacy enhancing technologies (PETs)

What Are Privacy-Enhancing Technologies (PETs) And How You Can Choose the Right One(s)

Peaceful demonstration against war with Lithuania flag showing Russian hackers DDoS cyber attacks

Russian Hackers Claim Responsibility for DDoS Cyber Attacks on Lithuania

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results