Recently, you may have heard about the “Krack” Wi-Fi vulnerability that has the potential to affect literally every connected device on the planet. What really is Krack? Could it affect your business operations? If so, what should you do about it?
Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.
Cyberattackers often try to gain entry to critical IT systems through the various electronic entry points and backdoors left by the programmers who created them. Some hackers take the human approach, which can be much simpler, and attempt to get password and network access information by calling employees directly and impersonating their IT colleagues.
Cybersecurity is a top concern of businesses today. While often thought of as an IT issue, cyberdefense tactics often have surprising overlaps with business strategies inherent to the finance department. As a result, more chief financial officers (CFOs) are becoming cybersecurity custodians.
A recent analysis has found that vendors critical to supporting finance organizations lack the same security standards these organizations hold for themselves, potentially putting many businesses in the finance industry at serious risk.
With reported data breaches increasing by a staggering 40%, we thought 2016 was bad. 2016 was also the year that Yahoo earned the dubious distinction of the biggest data breach ever (1 billion accounts affected). In 2017, the breaches keep coming … and we’ve still got a little over three months left.
Connected physical security devices can represent a weak point in a network’s security, leaving the rest of the network vulnerable to attack. How do you safeguard the devices intended to keep you safe?
Whenever disaster strikes, there are some people who view the tragedy as an opportunity to take financial advantage. The recent devastation in the wake of Hurricane Harvey is no exception, and cybercriminals are perpetrating scams seeking to exploit the good nature of their victims.
Information sharing is a big part of—and logically supports—incorporating cybersecurity into other critical infrastructure risks. It makes sense to put all risk mitigation practices into one comprehensive program.
There’s always something new going on in the world of cybersecurity! We’ve rounded up a few items that you may have missed in the past couple of weeks, from spyware invading apps to new car hacks to FBI recommendations for private businesses.
A draft update to the National Institute of Standards and Technology’s (NIST) widely used data privacy and security guidance was released August 15 for public comment.