Tag: malware

Faces of Security: Noureen Njoroge from Nike

Noureen Njoroge, Director of Global Cyber Threat Intelligence at Nike, has dedicated her life to solving problems, leading teams, and mentoring others, especially women entering the cybersecurity field. As a global keynote speaker and winner of several industry awards, Njoroge has vast knowledge of business management, threat mitigation, and data privacy. Before joining Nike, she […]

Report Ranks Top 10 Most Imitated Brands in Phishing Attacks

Social media network LinkedIn became, by far, the most impersonated brand in phishing attempts worldwide during the first quarter of 2022 (Q1’22), according to a new report. In a brand phishing attack, cybercriminals try to imitate the official website of a well-known brand by using a similar domain name or URL and webpage design to […]

Latest Cybersecurity Threats Underscore Need for Diligence

Organizations must continue to be proactive in cybersecurity due to the increased threat activity occurring worldwide. Between the most recent Okta breach to the Russian threats, organizations and individuals should be on the offense when securing their technology environment. The Cybersecurity and Infrastructure Security Agency (CISA) has issued a Shields Up alert to warn American […]

CISA, FBI Issue Cybersecurity Advisory Amid Russian Attack on Ukraine

While there are no specific or credible cyberthreats to the U.S. homeland as of press time, the Cybersecurity and Infrastructure Security Agency (CISA) has warned that Russia’s attack on Ukraine, which has involved cyberattacks on Ukrainian government and critical infrastructure organizations, may impact organizations both within and beyond the region, particularly in the wake of […]

Back to Basics: Understanding Phishing

Back to Basics is a new article series highlighting important, but possibly overlooked, information that security professionals should know. All businesses need to take steps to understand and combat shoplifting, including security professionals. While most shoplifting deals with people taking merchandise, phishing is a cybercrime in which information is stolen through deceit, which is used […]

Protecting Against Software Supply Chain Attacks

Evidenced by the high-profile breaches of SolarWinds and Microsoft Exchange Server, cybercriminals are targeting weak links in the software supply chain and compromising code with dramatic effect. According to a report by the Identity Theft Resource Center (ITRC), there was a 42% rise in the number of supply chain attacks in the first quarter of 2021 compared to Q4 2020. However, while […]

Cybersecurity Best Practice Is for Life, Not Just for October

The arrival of Cybersecurity Awareness Month every October prompts discussion of best practice, and briefly raises the profile of security professionals. However, major attacks on organizations such as SolarWinds and Kaseya, and breaches of financial giants such as Morgan Stanley (caught up in the security problems of file-sharing company Accellion), should serve as a reminder […]

Security Breaches and the Dangers of Tailgating

A couple of years back, Boon Edam surveyed a large group of security executives to gauge their understanding of how big a risk tailgating is to their enterprise security and organization overall. The study uncovered something that shouldn’t necessarily come as a surprise to any of us, especially as the light was starting to shine […]

cybersecurity

9 Online Threats to Your Business in 2021

Although the COVID-19 pandemic has accelerated technological adoption (think: WFH and virtual schooling and all the new tools you’ve had to learn), it has also exposed cyber vulnerabilities for businesses worldwide.  According to Microsoft, globally, attacks jumped from less than 80 million in February 2020 to a high of nearly 120 million in April and […]

Business woman hacked computer

Cybersecurity Training Basics

In our highly digitized world, the potential for theft, fraud, and other crimes is often greater through a computer than it is in person. The amount of information and access controlled in the cyber realm, as well as the ability to strike anonymously from anywhere around the globe, means hacking, phishing, and other cybercrimes are […]