CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
A to Z
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Man holding head with ransomware on screen showing ransomware prevention
Cyber SecurityInsights

5 Security Best Practices for Ransomware Prevention

February 15, 2022
Ransomware groups take advantage of security weaknesses to execute common attack vectors. Taking action with these security best practices and closing any identified security weaknesses within an organization decreases the risk of a ransomware infection.
Read More
Dashboards in command center showing the five questions which could be used to re-evaluate your MSSP
Cyber SecurityInsights

5 Signs You Should Re-Evaluate Your Relationship with Your MSSP

November 13, 2019
How do you know your MSSP, managed security service provider, can be trusted and is offering higher value security services that extend beyond simple monitoring and analysis?
Read More
Smartphone with application icons showing the five steps to securing enterprise mobile app
Cyber SecurityInsights

5 Steps to Securing Your Enterprise Mobile App

December 13, 2019
It's important to secure your enterprise mobile app to prevent hackers from exploiting the vulnerabilities. What are the steps to create a more secure app before releasing it to the market?
Read More
Hand touching screen of smartphone showing cyber defense
Cyber SecurityInsights

5 Ways Enterprises Can Protect Their Data, Time, Money, and Infrastructure

May 26, 2022
With heavy interference by law enforcement, there has been an anticipated shift from critical infrastructure cyberattacks to corporate enterprise companies. The enterprise attack surface, which is the sum of all entry and exit points, is massive.
Read More
Man in front of virtual screen showing cyber resilience against data breach
Cyber SecurityInsights

5 Ways Organizations Can Increase Readiness and Resilience To Avoid a Major Crisis When a Breach Occurs

July 26, 2022
Combining elements of information security, business continuity, and organizational resilience, a cyber resilience strategy can enable rapid recovery from an inevitable attack with little to no operational disruption.
Read More
Google Chrome logo on laptop screen showing 500 delisted Chrome browser extensions used in massive ad fraud campaign
Cyber SecurityNews

500 Delisted Chrome Browser Extensions Part of Massive Ad Fraud Campaign Active for Years

March 4, 2020
Google has culled 500 over Chrome browser extensions used in a massive ad fraud campaign that pingponged 1.7 million users through dozens of ads and redirected them to phishing site.
Read More
Man typing username and password on virtual screen showing third-party data breach
Cyber SecurityNews

51% Of Organizations Experienced a Third-Party Data Breach After Overlooking External Access Privileges

May 17, 2021
More than half of organizations experienced a third-party data breach attributed to external privileged access, and subsequent lack of control, auditing, and monitoring.
Read More
Imaginative visual of smart digital city with globalization abstract graphic showing 5G cybersecurity issues
Cyber SecurityInsights

5G and Cybersecurity – A Realistic Path Forward

September 6, 2021
Many cybersecurity issues are affecting 5G. In this article, we will be focusing on the 3 most severe ones – latency, passive eavesdropping and user impersonation.
Read More
5G and the Future of Cybersecurity
Cyber SecurityInsights

5G and the Future of Cybersecurity

April 4, 2019
Since 5G is not simply a faster version of 4G, but rather, an entirely new network architecture, it opens the door to entirely new security models for user privacy, identity management, and threat detection.
Read More
Rear View Of A Hacker Using Multiple Computers Showing Top Information Security Risks
Cyber SecurityInsights

6 Top Information Security Risks to Know in 2019

March 20, 2019
The 2019 Information Security Forum (ISF) Threat Horizon report contains information security risks that illustrate the importance, if not urgency, of updating cybersecurity measures fit for Fourth Industrial Revolution technologies.
Read More
1 … 4 5 6 7 8 … 171

Latest

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results