CYBER THIS WEEK – MARCH 26, 2023
Six Ways to Secure Your Organization on a Smaller Budget
Teams facing shortages should regroup and focus on priorities that can make a big difference. Surprisingly, many of the most effective ways to keep your organization secure are low-cost. Here are six ways to stretch your cybersecurity budget.
CISA gives ransomware victims a heads-up
The Pre-Ransomware Notification Initiative takes advantage of the time between initial penetration and data theft or encryption to notify victims so they can identify and eliminate hackers from their system
55 zero-day flaws exploited last year show the importance of security risk management
Deploying security patches as quickly as possible remains one of the best ways to prevent most security breaches, as attackers usually rely on exploits for publicly known vulnerabilities that have a patch available — the so-called n-day exploits.
Epidemic of Insecure Storage, Backup Devices Is a Windfall for Cybercriminals
Companies in every industry continue to leave backup and storage platforms unsecured, with more than a dozen issues, including insecure network settings and unaddressed CVEs, affecting the average device. That leaves these repositories — often the first line of protection in the event of a ransomware attack — as sitting ducks for cybercriminals.
7 tips to combat government data breach risks
In the last four years, the average number of government data records compromised per breach increased by more than 400%. This upward trend demonstrates how the impact of any single attack is growing, and it reflects a grim reality in the cyber world — cybercrime is transitioning from targets of opportunity to focused targets of choice. The shift is bad news for government agencies.
Analysts share 8 ChatGPT security predictions for 2023
The release of ChatGPT-4 last week shook the world, but the jury is still out on what it means for the data security landscape. On one side of the coin, generating malware and ransomware is easier than ever before. On the other, there are a range of new defensive use cases.
Meet Data Privacy Mandates with Cybersecurity Frameworks
In the coming months, data protection laws will continue to evolve and strengthen, requiring organizations to refine their data protection policies further and take demonstrable steps to safeguard the privacy of individual customers’ information. As part of the changing policy mandates, cybersecurity frameworks will also expand how companies keep customer data under a figurative lock and key.
Four Top Misconceptions in Cybercrime Threat Intelligence and How CISOs Should Think Instead
It’s time to clear the air about some top misconceptions about the cybercrime underground and cybercrime threat intelligence. Contrary to popular belief, in addition to nation-states and APTs, many attacks are carried out by opportunistic criminals looking for an easy way to make money rather than having a clear agenda and objectives.
Ferrari Confirms It Was Hacked, Will Not Pay Ransom
Automakers have recently become a bigger target for hackers as they seek to digitize their vehicles and add more connected features. Despite that, a recent Automotive News report indicates that the industry is among the cheapest when it comes to paying white-hat hackers to help them find cyber vulnerabilities.
Zero Trust Is A Huge Security Opportunity. It Also Means ‘Heartburn’ For Some MSPs.
Depending on what type of solution provider you are and what type of cybersecurity expertise you bring, zero trust is a massive growth opportunity or a source of additional pressure, due to the steep learning curve.