Microsoft announced a breach where they uncovered misconfigured security rules in one internal database that exposed 250 million customer service records for almost whole of December.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
While organizations should prepare for a passwordless authentication-based future, in the interim, companies need to implement a strategy that utilizes as few passwords as possible, including products such as a password manager for business, federation, and privileged access management (PAM).
Shift to remote working has contributed to an unrelenting cybersecurity emergency. Here are three cybersecurity lessons from the pandemic that every organization should learn as they prepare for the future of hybrid work.
Phishing is a massive cyber security threat and very much still plagues the healthcare industry. What are the email security setbacks faced by the healthcare providers which make them vulnerable?
No matter how boring or clichéd this might sound, information security policies and procedures are the pillars successful organizations are built on, setting the stage for a sound security culture and helping to create a foundation for a truly resilient organization.
Passwords are becoming more of a liability than the security asset they were intended to be. Should companies consider passwordless technologies for better benefits and cost savings?
Focusing on PCI compliance is a good way to improve risk management, find out what your company can do to reduce incidents, stop cyber threats and prevent regulatory fines.
The COVID-19 pandemic presented a moment of truth for companies in business resilience. The need for digital-first businesses that are customer-centric, data-driven, and deliver fast time to value which was an option is now an imperative.
Corporate boards are increasingly concentrating on cybersecurity issues. Here’s how to ensure they focus on third-party risk, too.
Fraudsters are taking advantage of recent increased use of marketplace platforms to run cybercrime, what can you do to prevent yourself from becoming victim of identity theft?