Tag: Cyberattack

Why Cybersecurity and Change Control Go Together Like Peanut Butter and Jelly

Whenever I read about a data breach, I immediately smell a cybersecurity process failure.   In cybersecurity, we sure love our processes. We have them for firewalls, intrusion detection systems, IP scans, pen testing, zero trust architecture, and double secret two factor authentication probation, but I’m going to dive into the most exciting process we […]

Spear Phishing vs. Phishing: 7 Ways to Protect Your Organization

Phishing attacks have ramped up since the start of the pandemic with the majority of workforces transitioned to a remote setting. Spear phishing has particularly seen an increase and can be even more harmful due to its targeted approach. Hackers target and personalize messages to a specific individual, group, or organization in a spear phishing […]

How Business Leaders Can Promote Better Cybersecurity Practices

Cybersecurity is less about what a business’ IT team does and more about the decision-making process. The growing risks to online security mean that leaders need to make wiser business decisions and rethink strategies that affect cybersecurity. Whether it’s working with contractors, upgrading software, or staying up to date with the latest threats, these are […]

‘The Enemy of the Day’: Ransomware Attacks Have Affected Over One-Third of Organizations

A new International Data Corp. (IDC) survey found that more than one-third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the previous 12 months. And for those that fell victim to ransomware, it is not uncommon to have experienced multiple ransomware events.

cloud security

Regaining Control of Enterprise Security in a Cloud Environment

As enterprises respond to the acceleration of remote working, hybrid cloud adoption continues to increase—but security remains a persistent blocker. Marcella Arthur, Vice President of Global Marketing at Unbound Security, looks at how emerging approaches to key management are enabling enterprises to rethink and assert control over their cloud strategies.

IBM Study: Every Data Breach Costs Companies Over $4.2M on Average

IBM Security announced the results of a global study which found that data breaches now cost surveyed companies $4.24 million per incident on average—the highest cost in the 17-year history of the report. Based on in-depth analysis of real-world data breaches experienced by over 500 organizations, IBM said the study suggests that security incidents became more costly […]

National Lab’s ‘Shadow Figment’ Tech Foils Cyberattacks

Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success. The aim is to sequester bad actors by captivating them with an attractive—but imaginary—world. The technology is aimed at protecting physical targets—infrastructure such […]

remote worker

Businesses Need to Prioritize Cybersecurity for Their Remote Workers

Though remote work started as a disaster response, businesses and employees alike have since noted the benefits that can come from working at home, including improved worker satisfaction, increased productivity, reduced commute times, and lower overheads. However, it’s important to acknowledge that alongside all of its advantages, remote work also has some ongoing issues, not […]

Pipeline Cyberattack Results in FMCSA Issuing HOS Exemption

On May 9, the Federal Motor Carrier Safety Administration (FMCSA) issued a temporary exemption for commercial motor vehicles (CMVs) from hours of service (HOS) regulations to ensure adequate fuel supplies in several East Coast states following a cyberattack on the Colonial Pipeline.