The Logic Behind Three Random Words
Published on May 18, 2022
via UK National Cyber Security Centre One of the most popular pages on the NCSC website, nearly 5 years after its first publication, is 'Three random words or #thinkrandom'. It explains how - by combining three random words - you can create a password that's…
Actions to Take When the Cyber Threat is Heightened
Published on May 13, 2022
via UK National Cyber Security Centre Balancing cyber risk and defence The threat an organization faces may vary over time. At any point, there is a need to strike a balance between the current threat, the measures needed to defend against it, the implications and…
1 Year Later: Actions Taken, Lessons Learned Since The Colonial Pipeline Cyberattack
Published on May 9, 2022
via Forbes A lot has happened in response to the Colonial Pipeline cyberattack a year ago today that created a crisis for the company and the country. President Joe Biden took steps to improve the country’s defenses against future cyberattacks and signed a bill into law that is designed to improve…
Responding to Heightened Cyberattack Risk: Focus on the Basics
Published on April 11, 2022
via CSO Online Take care of security basics first When reviewing your network for potential cyber threats, don’t make things worse by making misconfigurations that will create more problems. Spend time on the basics and on other projects that you probably should have worked on…
How to Protect Your Devices Against a Cyberattack
Published on March 23, 2022
Via ABC News A cyber security expert is sharing steps you should take, to protect yourself from a potential cyberattack. Hackers are already trying to break through, according to cyber security expert Randy Marchany. He said they're seeing an increase in probing, which means hackers…
How to Build a Culture of Cybersecurity
Published on March 17, 2022
Via MIT Sloan School of Management Technology and training are not enough to safeguard companies against today’s litany of cybersecurity attacks. Here’s how to infuse safe behavior into corporate culture. At a large bank, the CEO kicks off every all-staff meeting with a cybersecurity story,…
7 Pressing Cybersecurity Questions Boards Need to Ask
Published on March 14, 2022
Via Harvard Business Review For every new technology that cybersecurity professionals invent, it’s only a matter of time until malicious actors find a way around it. We need new leadership approaches as we move into the next phase of securing our organizations. For Boards of…
The End-User Frustration of Password Resets
Published on February 24, 2022
via Tech Genix Ask any user to list the things that frustrate them the most about their employer’s IT department, and password policies are sure to be near the top of the list. Password rage is real, and the typical way in which most organizations…
Don’t Ditch the Password Yet: Countering a Brute Force Attack
Published on February 15, 2022
There’s been a lot of chatter lately about moving on from passwords. But long passwords are still a good defense against some types of attacks. Brute force attack actors dedicate just a fraction of their efforts to cracking them, a Microsoft researcher found. The researcher…
Breach Response Shift: More Cyber-Insurance Coverage
Published on February 11, 2022
via Dark Reading Companies are more likely to rely on outside attorneys to handle cyber responses in order to contain potential lawsuits. Meanwhile, cyber insurance premiums are rising but covering less. The face of data breach investigations is changing as companies weigh business factors outside…