Category: Cybersecurity

Cybersecurity has taken the forefront on the global stage, and it’s more important than ever for companies to protect their sensitive data. Challenges such as bring your own device (BYOD), shadow IT, and social engineering further complicate the everyday cyberthreat. Look here for the latest news and best practices that can help you reduce your organization’s risk.

Blockchain Encryption Keys

Survey finds that Blockchain and Cryptocurrency are Having Impacts on Accounting and Finance Departments

Blockchain has been making plenty of headlines this year and is beginning to disrupt how business is conducted. Accordingly, it’s also placing additional demands on accounting and finance functions. Cryptocurrency is the major source of these changes which, according to 50% of financial leaders in a Robert Half Finance & Accounting survey, will become at […]

Doctor typing information on laptop in hospital office

Cyberattacks on Healthcare Industry Point to Ongoing Need for Training

Healthcare facilities all over the world tend to be reliable soft targets for cybercriminals. This is often due to the industry’s reliance on outdated or improperly patched hardware and software, making it easier for threat actors to find their way into the network. The fallout from a successful attack is also potentially devastating, given the […]

Man reading letter

Criminals Looking for Bitcoin are Taking the Road Less Traveled

This seems to be a busy week for some interesting attempts at social engineering through snail mail. Reports from earlier this week outlined the random campaign by (apparently) Chinese cybercriminals sending out malware-laden compact discs to state and local government agencies. On Wednesday, Kent German presented his tale of being extorted for bitcoin via letter […]

Are the Robotics in your Manufacturing Infrastructure Properly Protected?

More manufacturers than ever before are turning to automation, whether to combat rising production costs or increase productivity. Modern automation systems operate on Operational Technology (OT) networks, comprised of industrial control (ICS) and supervisory control and data acquisitions systems (SCADA). These systems are designed to operate in conjunction with each other and are quite sensitive […]

Documents

A Reminder That Social Engineering Takes Many Forms

Sometimes when you’re working in a high-tech space, a low-tech solution might be just what you need to solve a problem. Apparently, the same goes for cybercriminals. For example, some of the most effective social engineering attacks start with a phone call. This one reported by Brian Krebs is a bit of a head-scratcher, though.

The Need for a CISO

In the business world, it’s common to hear of discussions taking place at the “C-Suite Level,” which usually includes the chief executive officer (CEO), chief financial officer (CFO), the chief operating officer (COO), and the chief information officer (CIO). More cyber professionals are taking on roles at this level as well, as chief technology officers […]