Increasingly Sophisticated Cyberattacks Target Healthcare

It’s rare to see 100% agreement on a survey. But Porter Research found consensus from business leaders across the provider, payer and pharmaceutical/life sciences industries. Every single person agreed that “growing hacker sophistication” is the primary driver behind the increase in ransomware attacks. In response to the findings, the American Hospital Association told Porter Research, […]

The post Increasingly Sophisticated Cyberattacks Target Healthcare appeared first on Security Intelligence.

Continue reading Increasingly Sophisticated Cyberattacks Target Healthcare

CISA, NSA Issue New IAM Best Practice Guidelines

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently released a new 31-page document outlining best practices for identity and access management (IAM) administrators.  As the industry increasingly moves towards cloud and hybrid computing environments, managing the complexities of digital identities can be challenging. Nonetheless, the importance of IAM cannot […]

The post CISA, NSA Issue New IAM Best Practice Guidelines appeared first on Security Intelligence.

Continue reading CISA, NSA Issue New IAM Best Practice Guidelines

CISA, NSA Issue New IAM Best Practice Guidelines

The Cybersecurity and Infrastructure Security Agency (CISA) and the National Security Agency (NSA) recently released a new 31-page document outlining best practices for identity and access management (IAM) administrators.  As the industry increasingly moves towards cloud and hybrid computing environments, managing the complexities of digital identities can be challenging. Nonetheless, the importance of IAM cannot […]

The post CISA, NSA Issue New IAM Best Practice Guidelines appeared first on Security Intelligence.

Continue reading CISA, NSA Issue New IAM Best Practice Guidelines

NIST Launches Cybersecurity Initiative for Small Businesses

For small organizations, the current cyber threat landscape is brutal. While big-name breaches steal the headlines, small businesses suffer the most from ransomware attacks. Additionally, other studies reveal that only half of all small businesses are prepared for a cyberattack. In the face of these challenges, NIST is creating a new initiative to help.  To […]

The post NIST Launches Cybersecurity Initiative for Small Businesses appeared first on Security Intelligence.

Continue reading NIST Launches Cybersecurity Initiative for Small Businesses

NSA Releases New Best Practices for Securing Home Networks

You depend on your home network for binge-watching your favorite shows and ordering the perfect pair of shoes. When it’s time to pay bills or manage your retirement accounts, you likely head online as well. Not to mention that home networks make it possible for you to work from home and for your kids to […]

The post NSA Releases New Best Practices for Securing Home Networks appeared first on Security Intelligence.

Continue reading NSA Releases New Best Practices for Securing Home Networks

Triple Extortion and Erased Data are the New Ransomware Norm

The old days of “honest” ransomware gangs are long gone. In the past, ransomware groups pressured each other to honor file decryption promises after the ransom was paid. However, their motives were far from altruistic. They thought victims would be less willing to pay if word got out that their files would never be recovered. […]

The post Triple Extortion and Erased Data are the New Ransomware Norm appeared first on Security Intelligence.

Continue reading Triple Extortion and Erased Data are the New Ransomware Norm

Securing Your Remote Workforce: How to Reduce Cyber Threats

The debates have (mostly) stopped about whether remote work is here to stay. For many people, it’s just the way we work today. However, even three years later, cybersecurity around remote work is still a top concern. Both companies and employees have room for improvement in terms of protecting devices, data and apps from cybersecurity […]

The post Securing Your Remote Workforce: How to Reduce Cyber Threats appeared first on Security Intelligence.

Continue reading Securing Your Remote Workforce: How to Reduce Cyber Threats

And Stay Out! Blocking Backdoor Break-Ins

Backdoor access was the most common threat vector in 2022. According to the 2023 IBM Security X-Force Threat Intelligence Index, 21% of incidents saw the use of backdoors, outpacing perennial compromise favorite ransomware, which came in at just 17%. The good news? In 67% of backdoor attacks, defenders were able to disrupt attacker efforts and […]

The post And Stay Out! Blocking Backdoor Break-Ins appeared first on Security Intelligence.

Continue reading And Stay Out! Blocking Backdoor Break-Ins

Six Ways to Secure Your Organization on a Smaller Budget

My LinkedIn feed has been filled with connections announcing they have been laid off and are looking for work. While it seems that no industry has been spared from uncertainty, my feed suggests tech has been hit the hardest. Headlines confirm my anecdotal experience.  Many companies must now protect their systems from more sophisticated threats […]

The post Six Ways to Secure Your Organization on a Smaller Budget appeared first on Security Intelligence.

Continue reading Six Ways to Secure Your Organization on a Smaller Budget

OneNote, Many Problems? The New Phishing Framework

There are plenty of phish in the digital sea, and attackers are constantly looking for new bait that helps them bypass security perimeters and land in user inboxes. Their newest hook? OneNote documents. First noticed in December 2022, this phishing framework has seen success in fooling multiple antivirus (AV) tools by using .one file extensions, […]

The post OneNote, Many Problems? The New Phishing Framework appeared first on Security Intelligence.

Continue reading OneNote, Many Problems? The New Phishing Framework