Cybersecurity
Category Added in a WPeMatico Campaign
Companies of all sizes are being challenged to install policies and secure data on a growing number of devices, which leads to an increased volume of alerts to be managed. All this, while balancing the skills and resources gap in IT and cyber security. CISOs and security owners, especially those operating small and medium sized […]
Heightened cyber threats from state-supported groups, the evolution of threat actors’ tactics and the ongoing trend for remote working have combined with the ongoing skills shortages within the cyber security sector to place further pressure on CISOs. The publication of the CS Hub Mid-Year Market Report 2022 offers a timely analysis of trends, innovations and […]
Cybercrime is evolving and phishing attacks are becoming more targeted. Still, some 75 percent of ransomware attacks continue to originate from email, with attackers working together to hunt down the smallest of openings to generate multi-million-dollar ransoms. Cyber Security Hub’s research reveals that phishing and social engineering attacks remain the biggest threats to organizations in […]
Threats to email security are on the rise. Without sufficient strategies, companies open themselves, their clients and customers to the consequences of cyber security incidents such as phishing, data breaches and business email compromise (BEC). They must protect this vulnerable asset without compromising its efficiency in communication. These threats to the internal working of the […]
Companies rely on data transfers to communicate between departments and with clients. However, there are several risks if these data transfers are insecure. If insecure file transfer methods such as unencrypted email or cloud services are used, companies can open themselves up to potential exploitation by malicious actors. When considering data transfer security, one of […]
The Police Service of Northern Ireland (PSNI) suffered a “critical incident” on August 8, after the personally identifying information for all of its employees was published online. The “monumental” data breach occurred when data was mistakenly posted online following a Freedom of Information (FoI) request. A database, which included the surname, initials, rank/grade, role and […]
As the threat landscape develops, region-specific trends are revealed. Europe, the Middle East and Africa (EMEA) and the North American market (NAM) see a large range of targeted threats including key employee and role targeting, malicious code commits and third-party data breaches. An estimated 53.35 million US citizens were affected by cyber crime in the […]
As organizations around the world prioritize digitization, the focus on cloud security is rapidly growing. Security flaws such as limited visibility, lack of threat detection and response capabilities, and the inability to detect unknown threats or misconfigurations within cloud environments, can all have devastating consequences. Misconfigured cloud resources can cause unintentional data leaks, and an […]