CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Hacker using laptop against binary code world map showing DDoS attack and data breach with leaked data on hacker forum
Cyber SecurityNews

3.7 Million FlexBooker Accounts Leaked to Hacker Forum After DDoS Attack

January 12, 2022
FlexBooker, a commonly used appointment scheduling and calendar service, is apologizing to its customers after 3.7 million records appeared on a dark web hacker forum following a DDoS attack.
Read More
Businessman waiting in airport showing the risks of visual hacking for business travelers
Cyber SecurityNews

3M’s Global Visual Hacking Study Highlights Risks for Business Travelers

July 4, 2019
Despite the potential for visual hacking to take place in public, only 30% of business travelers say that their organizations have educated them on how to protect sensitive information.
Read More
Young Caucasian man make notes working on laptop participating in security awareness campaign
Cyber SecurityInsights

4 Critical Elements of Effective Security Awareness Campaigns

April 9, 2021
A transformational communication program will move beyond one-size-fits-all messaging and approaches. Here we take a look at four critical elements of effective security awareness campaigns.
Read More
Woman standing in the middle of virtual SIEM metrics and dashboards
Cyber SecurityNews

43% Of Security Practitioners Believe They Are Overpaying for Their SIEM

September 9, 2021
Report found that 43% of IT security professionals surveyed believe they are paying too much for their current SIEM solution relative to the system's capabilities and the value it brings the organization.
Read More
Man holding smartphone. using laptop and tablet showing zero trust architecture
Cyber SecurityInsights

5 Critical Considerations in Building a Zero Trust Architecture

June 3, 2022
Implementing a Zero Trust architecture will help mitigate and ultimately lower the number of successful cybersecurity attacks your organization might otherwise endure, greatly reducing operational and financial risk. Here are five practical steps.
Read More
Virtual locks over the globe showing defense for ransomware attacks
Cyber SecurityInsights

5 Defenses for 5 Ransomware Root Causes

December 6, 2021
Ransomware groups have shifted from the automated, ‘spray and pray’ tactics of yesterday to highly targeted, human-operated ransomware attacks, carefully crafted to find and encrypt your data and cause maximum critical service disruption.
Read More
Illuminated building of bank at night night showing financial sector fight against fraud across digital channels
Cyber SecurityInsights

5 Priorities for Banks to Secure the Post-Pandemic Shift Towards Digital and Mobile Channels

February 23, 2021
The financial sector, state and federal government agencies, as well as consumers are being targeted with various types of fraud, identity theft and data security breaches during the pandemic.
Read More
Hand holding digital hologram cloud sign on city background showing cloud computing
Cyber SecurityInsights

5 Reasons Cloud Won’t Save You Money

January 19, 2022
As the use of cloud has grown and matured, so too has the recognition of a need for financial discipline in its management. In much the same way that DevOps applies a developer perspective to IT operations, FinOps will apply financial rigor to cloud.
Read More
Access solution at the doors of building showing new normal
Cyber SecurityInsights

5 Reliable Access Solutions for Offices Under the New Normal

November 19, 2021
Integrated, confidential health screening is one of the top priorities, combined with touchless entry. Intercom access control can also help facilitate social distancing and remote access management. Leading intercom systems suppliers are gearing up for the New Normal.
Read More
Man holding head with ransomware on screen showing ransomware prevention
Cyber SecurityInsights

5 Security Best Practices for Ransomware Prevention

February 15, 2022
Ransomware groups take advantage of security weaknesses to execute common attack vectors. Taking action with these security best practices and closing any identified security weaknesses within an organization decreases the risk of a ransomware infection.
Read More
1 … 3 4 5 6 7 … 163

Latest

Developers typing on keyboards while writing code showing API security and cybersecurity incidents

Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually

Robot toys gather around a laptop showing Russian botnet for proxy service

International Law Enforcement Partnership Takes Down Russian Botnet; Illicit Proxy Service Had Been Selling Hacked IP Addresses

Team discussing cybersecurity strategy in front of laptops

Can Your Cybersecurity Strategy Stop a Determined Attacker?

Close up of cyber criminal hacking and cyber attacks

67% Of Businesses Suffer Repeat Cyber Attacks Within 12 Months After the First Data Breach

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results