Category: Cybersecurity
Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.
It’s been over four years since the European Union implemented its groundbreaking General Data Protection Regulation. The GDPR has become the model for personal data privacy laws in many other countries and for the California Consumer Privacy Act (CCPA), which took effect in 2020. New data privacy laws are set to take effect in four […]
IBM Security released its 2022 Cost of a Data Breach Report, revealing costlier and higher-impact data breaches than ever before, with the global average cost of a data breach reaching an all-time high of $4.35 million for studied organizations. With breach costs increasing nearly 13% over the last two years of the annual report, the findings suggest these […]
Energy is one of the top three industries reporting cyberattacks, and it faces specific challenges. Companies in the sector have been tackling IT security for several decades. But securing operational technology (OT)—the computing and communications systems that manage, monitor, and control industrial operations—has become a more recent and increasingly urgent challenge for the sector. As […]
The intelligence industry, like so many industries, has had to evolve in response to today’s hyper-connected world. Intelligence has long played an important role in helping organizations manage risk. But there is an evolution in the value placed on intelligence beyond risk management. In this fast-moving and often unpredictable world, intelligence is not only growing […]
With an increasing number of businesses experiencing cyberattacks, many find themselves unaware their insurance plans do not cover the costs of cyberattacks. Insurance providers worldwide already offer separate plans for tackling cybersecurity incidents, though qualifying apparently is more challenging than expected. According to IBM, in 2021, a data breach cost companies $4.24 million on average—an […]
Small and midsize businesses (SMBs) across the globe are still relying only on usernames and passwords to secure critical employee, customer, and partner data, according to the Global Small Business Multi-Factor Authentication (MFA) Study released by the Cyber Readiness Institute (CRI). Only 46% of small business owners claim to have implemented MFA methods recommended by leading security experts, with […]
The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the U.S. Department of the Treasury released a joint Cybersecurity Advisory (CSA) that provides information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health (HPH) Sector organizations. The […]
Cybersecurity is a topic that everyone knows should be addressed, but when it comes down to it, few know where to begin—or, even worse, companies assume that just having some level of compliance with industry standards is sufficient. But with the standards constantly changing and bad actors using increasingly sophisticated tactics, it’s ill-advised to wait […]
Editor’s note: This checklist is a broader companion piece to a previous article, “How Government Organizations Can Protect Their Physical Security Systems from Cyber Risk.“ In many organizations, there has been a long-held perspective that IT and physical security are separate realms and their work and concerns do not intersect. However, in light of the […]
Employees have been working remotely (i.e., any place with an Internet connection) since at least the mid-2000s. The COVID-19 outbreak, which started in 2020, forced employers to permit employees with certain types of jobs (usually white-collar) to work remotely on at least a part-time basis. IT departments were overwhelmed by the pressing need to set […]