DDoS traffic capitalizes on remote working connectivity reliance to disrupt service provider targets

In the first quarter of 2020, DDoS attacks rose more than 278% compared to Q1 2019 and more than 542% compared to the last quarter, according to Nexusguard. Working from home as the new norm Researchers attribute the sharp rise in incidents to maliciou… Continue reading DDoS traffic capitalizes on remote working connectivity reliance to disrupt service provider targets

CIOs are apprehensive about interruptions due to expired machine identities

TLS certificates act as machine identities, safeguarding the flow of sensitive data to trusted machines. With the acceleration of digital transformation, the number of machine identities is skyrocketing. At the same time, cybercriminals are targeting m… Continue reading CIOs are apprehensive about interruptions due to expired machine identities

How Growing Businesses Should Tackle Cybersecurity Challenges

When we think about the most public cyber attacks and data breaches, we generally associate them with large enterprises. The truth is cyber attacks are not limited by company size. A significant cyber attack can happen to any company, in any industry and of any size. According to the 2019 Cost of a Data Breach […]

The post How Growing Businesses Should Tackle Cybersecurity Challenges appeared first on Security Intelligence.

Continue reading How Growing Businesses Should Tackle Cybersecurity Challenges

Ransomware attacks are increasing, do you have an emergency plan in place?

39% of organizations either have no ransomware emergency plan in place or are not aware if one exists. This is despite more ransomware attacks being recorded in the past 12 months than ever before, Ontrack reveals. Cyberattacks and data breaches can ha… Continue reading Ransomware attacks are increasing, do you have an emergency plan in place?

Organizations need an agile response to unexpected risks

The average $5 billion company incurs delays of roughly 5 weeks per year in new product launches due to missed risks, with a $99 million opportunity cost, according to Gartner. Opportunity costs from missing risks A survey of more than 382 strategic in… Continue reading Organizations need an agile response to unexpected risks

Remote employees encounter 59 risky URLs per week

Working remotely from home has become a reality for millions of people around the world, putting pressure on IT and security teams to ensure that remote employees not only remain as productive as possible, but also that they keep themselves and corpora… Continue reading Remote employees encounter 59 risky URLs per week

To Reduce Cyber Risk, Strive for SecOps

SecOps teams must come together from day one to maintain performance and security within their organizations Last year, the average business lost $13 million to cybercrime, which is 12% more than in 2017 and 72% more than in 2014. When Tanium recently… Continue reading To Reduce Cyber Risk, Strive for SecOps

With remote working on the rise, infosec strategies need to evolve

The recent pandemic created a new normal that redefines the way business operates by eliminating security and physical work borders. An Avertium study found that having employees work from home during the pandemic saved U.S. employers more than $30 bil… Continue reading With remote working on the rise, infosec strategies need to evolve

Core cybersecurity principles for new companies and products

The rapid increase in cyberattacks and pressures escalating from changes prompted by COVID-19 have shifted consumer behavior. The findings of a report by the World Economic Forum outline core cybersecurity principles and point to how companies and inve… Continue reading Core cybersecurity principles for new companies and products

Fixing all vulnerabilities is unrealistic, you need to zero in on what matters

As technology constantly advances, software development teams are bombarded with security alerts at an increasing rate. This has made it nearly impossible to remediate every vulnerability, rendering the ability to properly prioritize remediation all th… Continue reading Fixing all vulnerabilities is unrealistic, you need to zero in on what matters