Safeguarding Healthcare for the Future With Zero Trust Security

A Zero Trust security model can help healthcare organizations provision access in a more effective manner by focusing on data, workloads and identity.

The post Safeguarding Healthcare for the Future With Zero Trust Security appeared first on Security Intelligence.

Continue reading Safeguarding Healthcare for the Future With Zero Trust Security

The Top 8 Concerns for CISO’s in 2020

Although a relatively new corporate position, Chief Information Security Officers (CISOs) are becoming an integral part of the corporate hierarchy as enterprises begin to take security concerns more seriously. It’s a smart move considering that in 2019… Continue reading The Top 8 Concerns for CISO’s in 2020

We Need More Than Security Awareness to Combat Insider Threats

When I was new to this industry, I firmly believed that insider threats occurred because people didn’t know how to be safe online.

The post We Need More Than Security Awareness to Combat Insider Threats appeared first on Security Intelligence.

Continue reading We Need More Than Security Awareness to Combat Insider Threats

Shifting From Ransomware Detection to Prevention

While prevention is no easy feat, there are steps that can reduce the risk of opportunistic ransomware attacks, including running backups and embedding threat intelligence.

The post Shifting From Ransomware Detection to Prevention appeared first on Security Intelligence.

Continue reading Shifting From Ransomware Detection to Prevention

Network complexity and lack of visibility contribute to misconfigurations and increased risk

Enterprises are slow to abandon manual processes, despite being short staffed, as the lack of automation, coupled with increasing network complexity risk and lack of visibility contribute to costly misconfigurations and increased risk, a FireMon report… Continue reading Network complexity and lack of visibility contribute to misconfigurations and increased risk

Cybersecurity is About Teamwork, Not Individuals

More and more, businesses blame cyberattacks on “human error,” that single employee who, either accidentally or maliciously, made a decision that resulted in a security breach. You probably remember the 2017 Equifax breach that exposed over… Continue reading Cybersecurity is About Teamwork, Not Individuals

How to remove human error from the cyber risk equation

In attempting to fortify the enterprise’s cyber assets, we have turned much of our attention to human error. After all, the vast majority of hackers rely upon their exploitation of employees to break through corporate defenses, anticipating that these … Continue reading How to remove human error from the cyber risk equation

Why Humans Are a Growing Target for Cyberattacks — And What to Do About It

Cybersecurity defenses and cyberattack methods are evolving rapidly, but human beings, not so much. This is why nearly all cyberattacks are now based on exploiting human nature.

The post Why Humans Are a Growing Target for Cyberattacks — And What to Do About It appeared first on Security Intelligence.

Continue reading Why Humans Are a Growing Target for Cyberattacks — And What to Do About It

Rethinking Responsibilities and Remedies in Social-Engineering Attacks

The idea that humans are the weakest link shouldn’t guide the thinking on social-engineering defense. Continue reading Rethinking Responsibilities and Remedies in Social-Engineering Attacks

Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program

Reading Time: 4 minutes When implemented correctly, zero trust can improve a company’s resilience to recover after a breach. But when you don’t trust users to make good decisions and act accordingly, the system falls apart.

The post Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program appeared first on Security Intelligence.

Continue reading Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program