How to secure your data and communication when working remotely The unprecedented rise in remote working following the Covid-19 crisis has led to a significant increase in attack opportunities for cyber criminals. Because all remote access occurs over the internet, any communication between teleworkers is susceptible to man-in-the-middle and eavesdropping attacks. Additionally,
Verizon recently released its 2019 Incident Preparedness and Response Report (VIPR) - “Taming the Data Breach” - based on data collected from companies across industry verticals between 2016 and 2018. The company analyzed the Incident Response or IR Plans of organizations from the finance and insurance (33%), retail trade (17%), manufacturing (15%),
October 2018 to April 2019 The UK’s National Cyber Security Centre (NCSC) recently released its cyber incident trends report for the period between October 2018 and April 2019. The report covers five main cyber attack trends seen in the UK - (1) attacks on Office 365 deployments (and cloud services in general),
Cyberattacks come in all shapes and forms. They are everywhere, and whether you know it or not, you’ve likely been a victim of one at some point. Even an occasional look at IT news will tell you just how widespread cybercrime is and how many areas of life it affects. Yet many
Cyber Attack Trends 2019 Check Point Research released its 2019 mid-year report on Cyber Attack Trends last month. The report puts targeted ransomware attacks at the top of its list of dominant ongoing trends in 2019. Cryptomining attacks, on the other hand, have declined considerably over the past year, with only
Cybersecurity Insiders recently released its 2019 Cloud Security report based on a comprehensive online survey of cybersecurity professionals conducted in March 2019. According to the survey, the biggest cloud security challenges that businesses face are data loss / leakage (64 percent) and data privacy / confidentiality (62 percent), followed by legal and
Service and Deployment Models, Challenges and Security Principles Most businesses think of cloud services as being either less secure than on-site services because they expose sensitive data to a wider range of possible attacks or breaches, or more secure because “everything” is taken care of by the cloud provider. The fact, however,
The SANS Institute released its 2019 SOC Survey report – Common and Best Practices for Security Operations Centers - earlier this month. The 2019 survey finds that artificial intelligence and security automation are failing to live up to their promise in the real world, with most surveyed security professionals being less than happy with the performance of the AI / ML solutions they have adopted. On the other hand, perimeter security, which is often given short shrift in current security-related discussions, continues to deliver solid, consistent results.
CIS CSAT is a free web-based tool that allows organizations to assess their cybersecurity strategy and infrastructure against the Center for Internet Security’s 20 Critical Controls. The tool was developed for CIS by EthicalHat Cyber Security, and is based on AuditScripts’ popular CIS Controls Manual Assessment spreadsheet. It helps businesses easily track their documentation, implementation, automation and reporting of CIS Controls, and compare their own security performance with the industry average.
First American Financial Corp has been sued by a client following the data leak it suffered recently that exposed over 885 million records