CYBER THIS WEEK – SEP 1O, 2023
SMB security essentials: Layer up security defense
Once a company has grown to about 50 or so employees, it’s time to move beyond cookie-cutter solutions and dedicate some time to reviewing security posture. What follows are some concrete ideas for SMB IT and security personnel to examine to ensure they are effectively building a multi-faceted defense at the right level of maturity.
5 Common Business Mistakes in Ransomware Prevention Planning
Robust ransomware prevention is more important than ever. This becomes very clear when you consider what causes the majority of ransomware attacks nowadays. Some are caused by errors that are easily avoidable. Let us examine some of the most common issues that leave organizations vulnerable to ransomware attacks.
Zero-day attacks are on the rise. Can patches keep up?
Zero-day exploits are increasingly used by cyber crime gangs and nation-state actors, and we’ve only just begun to see the severity and wide-spreading reach of the damage.
Emerging cyber threats in 2023 from AI to quantum to data poisoning
In cybersecurity’s never-ending cat-and-mouse game with hackers and grifters, the threats are always evolving. Here are some of the main attacks experts see as the biggest and baddest on the horizon.
Security Service Edge (SSE) Gives Enterprises a Sophisticated Defense Against Cyberattack
SSE converges multiple cybersecurity capabilities within a single, cloud-native software stack that defends enterprises and their networks against anomalies, threats and sensitive data loss as a result of phishing, malware, ransomware, data theft, and other forms of unwanted access to locations, applications and resources.
Elevating Cyber Awareness: A Strategic Approach
As cybercriminals are successful and the daily task list for your security team expands, your staff need to set aside time for updating and improving their abilities. But more effort needs to be made to ensure that all staff are receiving effective cyber awareness training and that it’s not treated as just a one-and-done activity or a check-the-boxes task
Cryptocurrencies: How can organizations mitigate the risks of ransomware attacks?
In reality, not a week goes by without attacks affecting governments, schools, hospitals, businesses and charities, all over the world. These attacks have significant financial and societal costs. They can affect small businesses, as well as huge corporations, and can be particularly devastating for those involved.
Cybersecurity Builds Trust in Critical Infrastructure
Energy sector leaders often take cyber vulnerabilities seriously only after a significant breach. Experiencing a loss (or watching someone else’s) makes companies tighten cybersecurity to avoid similar losses. This pattern emphasizes the loss-avoidance aspects of cybersecurity. Yet thinking of cybersecurity solely as loss avoidance misses a key value generator cybersecurity provides: trust.
Cos need to assess cyber-risks quarterly instead of yearly: Deloitte
Companies need to assess their cyber risks on a quarterly basis owing to immense technological advancements
CISOs Under Scrutiny: How To Elevate And Protect Security Leadership
Over the last decade, the CISO role has expanded beyond its traditional responsibilities for security architecture, data protection and making technology more secure. Modern CISOs are now additionally tasked with more strategic initiatives, including overall cyber risk management, operational resiliency, innovation and growth.