Responding to Heightened Cyberattack Risk: Focus on the Basics
Published on April 11, 2022
via CSO Online Take care of security basics first When reviewing your network for potential cyber threats, don’t make things worse by making misconfigurations that will create more problems. Spend time on the basics and on other projects that you probably should have worked on…
How to Protect Your Devices Against a Cyberattack
Published on March 23, 2022
Via ABC News A cyber security expert is sharing steps you should take, to protect yourself from a potential cyberattack. Hackers are already trying to break through, according to cyber security expert Randy Marchany. He said they're seeing an increase in probing, which means hackers…
The End-User Frustration of Password Resets
Published on February 24, 2022
via Tech Genix Ask any user to list the things that frustrate them the most about their employer’s IT department, and password policies are sure to be near the top of the list. Password rage is real, and the typical way in which most organizations…
Don’t Ditch the Password Yet: Countering a Brute Force Attack
Published on February 15, 2022
There’s been a lot of chatter lately about moving on from passwords. But long passwords are still a good defense against some types of attacks. Brute force attack actors dedicate just a fraction of their efforts to cracking them, a Microsoft researcher found. The researcher…
Breach Response Shift: More Cyber-Insurance Coverage
Published on February 11, 2022
via Dark Reading Companies are more likely to rely on outside attorneys to handle cyber responses in order to contain potential lawsuits. Meanwhile, cyber insurance premiums are rising but covering less. The face of data breach investigations is changing as companies weigh business factors outside…
Businesses Suffered 50% More Cyberattack Attempts per Week in 2021
Published on January 28, 2022
Via Dark ReadingCyberattack attempts reached an all-time high in the fourth quarter of 2021, jumping to 925 a week per organization, partly due to attempts stemming from the Log4j vulnerability, according to new data. Check Point Research on Monday reported that it found 50% more…
Small Business Cybersecurity: What to Fix, What to Manage, and What to Outsource
Published on January 19, 2022
via Security Intelligence The risk posture of small and medium-sized businesses has changed a lot over the last few years. Bluntly: small businesses inherited a series of digital risks. Many of these risks, such as supply chain and cloud-related risks, can wound and devastate a small business. Meanwhile, the…
The Top 5 Cybersecurity Tools to Implement Right Now
Published on January 11, 2022
via Infosecurity Magazine Since the beginning of the pandemic, the US Federal Bureau of Investigation (FBI) has reported a 400% increase in cyber-attacks. What’s more, as of July 31 2021, the FBI has reported a 62% increase in reported ransomware incidents since the beginning of the year as…
Cost of Account Unlocks, and Password Resets Add Up
Published on November 1, 2021
via The Hacker News There are many labor-intensive tasks that the IT service desk carries out on a daily basis. None as tedious and costly as resetting passwords. Modern IT service desks spend a significant amount of time both unlocking and resetting passwords for end-users.…
Why Enterprises are Subcontracting Cybersecurity Work
Published on October 22, 2021
Via VentureBeat NewtonX market research revealed this week that 56% of organizations surveyed subcontract as much as 25% of their cybersecurity work. In the study, more than 100 chief information security officers, CTOs, and other senior decision-makers indicated a trend toward subcontracting one of the most critical roles…