Even the US president wants zero trust: Here’s how to make it a reality

President Biden’s executive order on improving the nation’s cybersecurity requires agency heads to develop a plan to implement a zero-trust architecture to effectively mitigate cyber risk. Increasing and enhancing an organization’s cybersecurity postur… Continue reading Even the US president wants zero trust: Here’s how to make it a reality

Reliance on third party workers making companies more vulnerable to cyberattacks

A survey from SecZetta revealed 83% of respondents agree that because organizations increasingly rely on contractors, freelancers, and other third party workers, their data systems have become more vulnerable to cyberattacks. Further, 88% of people say… Continue reading Reliance on third party workers making companies more vulnerable to cyberattacks

Most employees reusing personal passwords to protect corporate data

Nearly two thirds of employees are using personal passwords to protect corporate data, and vice versa, with even more business leaders concerned about this very issue. Surprisingly, 97% of employees know what constitutes a strong password, yet 53% admi… Continue reading Most employees reusing personal passwords to protect corporate data

50% of cybersecurity attacks are from repeat offenders

Lack of awareness and gaps in knowledge are a weak link for cybersecurity leadership who are responsible for strategic planning of cybersecurity defenses, leaving organizations exposed to risks, a Ponemon survey reveals. With 2021 already claiming high… Continue reading 50% of cybersecurity attacks are from repeat offenders

Unwanted bot traffic costs businesses $250 million a year

Netacea announced results from a report that reveals the high price that businesses pay because of unwanted bot traffic. According to survey respondents, automated bots operated by malicious actors cost businesses an average of 3.6% of their annual rev… Continue reading Unwanted bot traffic costs businesses $250 million a year

Hospitals still not protected from dangerous vulnerabilities

Ipsos conducted a research which examines attitudes, concerns, and impacts on medical device security as well as cybersecurity across large and midsize healthcare delivery organizations. Insights include how they correlate and diverge. Healthcare is on… Continue reading Hospitals still not protected from dangerous vulnerabilities

Ransomware and cyber insurance: What are the risks?

High-profile ransomware events, such as the Colonial Pipeline and Kaseya attacks, continue to create eye-popping headlines about how easily a cybercriminal group can cripple key infrastructure, hospitals, and schools. And with ransomware attacks growin… Continue reading Ransomware and cyber insurance: What are the risks?

A remedial approach to destructive IoT hacks

As of this year, there are more than 10 billion active IoT devices all over the world, many of which are deployed in enterprises. Keeping those devices secure is of the utmost importance, lest they be a way in for attackers, so it’s imperative that org… Continue reading A remedial approach to destructive IoT hacks

Calling on business leaders to ensure CISOs are part of the C-suite decision making process

Organizations across the world have made strides in remote working and collaboration during the COVID-19 pandemic, but the proliferation of digitization is creating significant new cyber threats that require radical cultural change at boardroom level. … Continue reading Calling on business leaders to ensure CISOs are part of the C-suite decision making process

Connected devices increasingly at risk as new ransomware attacks are reported almost daily

Ordr released a report on the state of connected devices. The 2021 study addresses pandemic-related cybersecurity challenges, including the growth of connected devices and related increase of security risks from these devices as threat actors took adva… Continue reading Connected devices increasingly at risk as new ransomware attacks are reported almost daily