5 of the biggest cybersecurity risks surrounding IoT development

The Internet of Things is permeating every facet of our lives. It brings with it new cybersecurity risks for developers to consider. The entrenchment of the Internet of Things (IoT) into every facet of our existence has established itself as both a superb innovation and a security minefield. The sheer number of connected devices in any one system presents numerous points of entry for nefarious purposes.

Read the source article at Welcome to Vodafone
None

5 of the biggest cybersecurity risks surrounding IoT development

The Internet of Things is permeating every facet of our lives. It brings with it new cybersecurity risks for developers to consider. The entrenchment of the Internet of Things (IoT) into every facet of our existence has established itself as both a superb innovation and a security minefield. The sheer number of connected devices in any one system presents numerous points of entry for nefarious purposes.

Read the source article at Welcome to Vodafone
None

5 of the biggest cybersecurity risks surrounding IoT development

The Internet of Things is permeating every facet of our lives. It brings with it new cybersecurity risks for developers to consider. The entrenchment of the Internet of Things (IoT) into every facet of our existence has established itself as both a superb innovation and a security minefield. The sheer number of connected devices in any one system presents numerous points of entry for nefarious purposes.

Read the source article at Welcome to Vodafone
None

Resolving the cyber security crisis of confidence – Information Age

As the number of high-profile data breaches continues to rise year-on-year, cybersecurity has never been as prominent in the public eye, with WannaCry being the most obvious recent example. This has caused a cyber security crisis of confidence for consumers, which businesses must take a leading role in resolving by educating their customers about how they can stay more secure online.

Read the source article at information-age.com
None

Resolving the cyber security crisis of confidence – Information Age

As the number of high-profile data breaches continues to rise year-on-year, cybersecurity has never been as prominent in the public eye, with WannaCry being the most obvious recent example. This has caused a cyber security crisis of confidence for consumers, which businesses must take a leading role in resolving by educating their customers about how they can stay more secure online.

Read the source article at information-age.com
None

Resolving the cyber security crisis of confidence – Information Age

As the number of high-profile data breaches continues to rise year-on-year, cybersecurity has never been as prominent in the public eye, with WannaCry being the most obvious recent example. This has caused a cyber security crisis of confidence for consumers, which businesses must take a leading role in resolving by educating their customers about how they can stay more secure online.

Read the source article at information-age.com
None

A 10-Step Solution for Cyber Security | Inc.com

All businesses face the risk of data breach, but recent studies indicate that small businesses are particularly susceptible. According to a 2016 report from the Ponemon Institute, 50 percent of smaller organizations surveyed experienced a data breach in the previous 12 months. New research by Symantec found that small businesses were victim to 43 percent of cyber attacks in 2015, up from 18 percent in 2011. Why are small businesses such a growing target?

Read the source article at inc.com

A 10-Step Solution for Cyber Security | Inc.com

All businesses face the risk of data breach, but recent studies indicate that small businesses are particularly susceptible. According to a 2016 report from the Ponemon Institute, 50 percent of smaller organizations surveyed experienced a data breach in the previous 12 months. New research by Symantec found that small businesses were victim to 43 percent of cyber attacks in 2015, up from 18 percent in 2011. Why are small businesses such a growing target?

Read the source article at inc.com

A 10-Step Solution for Cyber Security | Inc.com

All businesses face the risk of data breach, but recent studies indicate that small businesses are particularly susceptible. According to a 2016 report from the Ponemon Institute, 50 percent of smaller organizations surveyed experienced a data breach in the previous 12 months. New research by Symantec found that small businesses were victim to 43 percent of cyber attacks in 2015, up from 18 percent in 2011. Why are small businesses such a growing target?

Read the source article at inc.com

Five security trends that threaten your network hive

Russell Crampin analyses five key cyber security challenges facing businesses today and the steps that can be taken to secure the network ecosystem. A bee hive is an industrious place of team work, communication and productivity. Worker bees communicate and work together in an intricate and finely balanced system harvesting pollen and protecting their assets to produce the highest quality and volume of honey possible.

Read the source article at Continuity Central
None

Five security trends that threaten your network hive

Russell Crampin analyses five key cyber security challenges facing businesses today and the steps that can be taken to secure the network ecosystem. A bee hive is an industrious place of team work, communication and productivity. Worker bees communicate and work together in an intricate and finely balanced system harvesting pollen and protecting their assets to produce the highest quality and volume of honey possible.

Read the source article at Continuity Central
None

Five security trends that threaten your network hive

Russell Crampin analyses five key cyber security challenges facing businesses today and the steps that can be taken to secure the network ecosystem. A bee hive is an industrious place of team work, communication and productivity. Worker bees communicate and work together in an intricate and finely balanced system harvesting pollen and protecting their assets to produce the highest quality and volume of honey possible.

Read the source article at Continuity Central
None

Business needs to get real about cyber security, warn BT and KPMG

Cyber security must become something that everyone in an organisation always thinks about, according to the latest report on securing the digital enterprise by BT and KPMG. The global ransomware attack in May 2017 affected more than 200,000 computers in over 150 countries, including in the UK where the NHS was forced to restrict operations and turn away patients. Is this wake-up call for businesses to finally pay serious attention to cyber security?

Read the source article at computerweekly.com

Business needs to get real about cyber security, warn BT and KPMG

Cyber security must become something that everyone in an organisation always thinks about, according to the latest report on securing the digital enterprise by BT and KPMG. The global ransomware attack in May 2017 affected more than 200,000 computers in over 150 countries, including in the UK where the NHS was forced to restrict operations and turn away patients. Is this wake-up call for businesses to finally pay serious attention to cyber security?

Read the source article at computerweekly.com

Business needs to get real about cyber security, warn BT and KPMG

Cyber security must become something that everyone in an organisation always thinks about, according to the latest report on securing the digital enterprise by BT and KPMG. The global ransomware attack in May 2017 affected more than 200,000 computers in over 150 countries, including in the UK where the NHS was forced to restrict operations and turn away patients. Is this wake-up call for businesses to finally pay serious attention to cyber security?

Read the source article at computerweekly.com

6 Tips To Build A Cyber-Security Culture At Work

Symantec’s 2016 Internet Security Threat Report shows that almost half of all cyber security attacks target small businesses with less than 250 employees. According to the U.S. National Cyber Security Alliance, 60 percent of small businesses cannot sustain their businesses beyond six months after a cyber-attack. Even big companies can experience a long-term hit to their brand and revenue after an attack.

Read the source article at huffingtonpost.ca

6 Tips To Build A Cyber-Security Culture At Work

Symantec’s 2016 Internet Security Threat Report shows that almost half of all cyber security attacks target small businesses with less than 250 employees. According to the U.S. National Cyber Security Alliance, 60 percent of small businesses cannot sustain their businesses beyond six months after a cyber-attack. Even big companies can experience a long-term hit to their brand and revenue after an attack.

Read the source article at huffingtonpost.ca

6 Tips To Build A Cyber-Security Culture At Work

Symantec’s 2016 Internet Security Threat Report shows that almost half of all cyber security attacks target small businesses with less than 250 employees. According to the U.S. National Cyber Security Alliance, 60 percent of small businesses cannot sustain their businesses beyond six months after a cyber-attack. Even big companies can experience a long-term hit to their brand and revenue after an attack.

Read the source article at huffingtonpost.ca

Consistent Software Patching Can Solve Your Security Woes

Security is an imperfect art. It’s also an imperfect science. Whether it involves experimenting with certain tweaks or implementing proven standards and prescriptive advice, figuring out how to manage a security program is as complex as navigating any other business function. According to the Pareto Principle, security professionals should focus on the 20 percent of security issues that cause 80 percent of their problems.

Read the source article at Security Intelligence

Consistent Software Patching Can Solve Your Security Woes

Security is an imperfect art. It’s also an imperfect science. Whether it involves experimenting with certain tweaks or implementing proven standards and prescriptive advice, figuring out how to manage a security program is as complex as navigating any other business function. According to the Pareto Principle, security professionals should focus on the 20 percent of security issues that cause 80 percent of their problems.

Read the source article at Security Intelligence

Consistent Software Patching Can Solve Your Security Woes

Security is an imperfect art. It’s also an imperfect science. Whether it involves experimenting with certain tweaks or implementing proven standards and prescriptive advice, figuring out how to manage a security program is as complex as navigating any other business function. According to the Pareto Principle, security professionals should focus on the 20 percent of security issues that cause 80 percent of their problems.

Read the source article at Security Intelligence

7 Best Practices Small Businesses Must Adopt Against Security Breaches

Instances of security breaches and information leaks where large companies are the “Target” easily make the headlines. You’ll hear of the millions of dollars in losses incurred by the companies and the damages they ended up paying. However, in recent times, a new realization is emerging. Small businesses employing fewer than 100 employees are the victims of 71% of cyber crimes.

Read the source article at The Global Dispatch

7 Best Practices Small Businesses Must Adopt Against Security Breaches

Instances of security breaches and information leaks where large companies are the “Target” easily make the headlines. You’ll hear of the millions of dollars in losses incurred by the companies and the damages they ended up paying. However, in recent times, a new realization is emerging. Small businesses employing fewer than 100 employees are the victims of 71% of cyber crimes.

Read the source article at The Global Dispatch

Are businesses over confident in their cyber security capabilities?

With the number of data breaches increasing and nearly 1.4 billion data records lost or stolen last year, it’s never been more important that businesses have confidence in their cyber security solutions, and understand which technologies best protect them. For example, the vast majority of IT professionals still believe perimeter security is effective at keeping unauthorised users out of their networks, according to the findings of Gemalto’s latest data security report.

Read the source article at information-age.com
None

Cybersecurity Strategy – Do You Have One Yet?

Cybersecurity Strategy – Do You Have One Yet? Cybercrime is becoming an epidemic. In fact, we’ve entered into the age when every company, from enterprise down to home-based businesses, must wake up and address their vulnerability to Internet and mobile-based leakages, threats, paralysis, ransomware, malware, and other forms of cyber crime. IT professionals often find themselves a step behind. By the time they catch up, hackers are already upgrading their tactics.

Read the source article at Software Solution

10 IT Security Risks for Small Businesses – IT for IT Blog

Managing security for any size business is a difficult job. The biggest corporations have large teams of IT executives, engineers and expert security advisers to help them out, and sometimes they still don’t get it right. The task of managing security for a small business can be even more challenging because you don’t have those layers of input to rely on.

Read the source article at Virtual Desktop

Report: Major Cloud Services Attack Could Cost $53 Billion

What trait does a global cyberattack and a hurricane share? Both could cost insurers – and victims – dearly, according to a report published Monday by insurance giant Lloyd’s of London. See Also: How the New World of Digital Banking is Transforming Fraud Detection A global, major attack on cloud computing services could cost an average of $53 billion, according to the report, which was co-written with Cyence, a firm that helps the insurance industry evaluate cyber-related risks.

Read the source article at databreachtoday.com

Test Your Knowledge of Workplace Cyber Warfare Threats – HR Daily Advisor

Cyber warfare can be used for all kinds of purposes, not just the hacking of politicians’ or political parties’ emails. Businesses and financial institutions are all fair game. To protect digital assets, which include proprietary information and sensitive personnel data, employers need to double down in this age of hacking and set up systems to handle possible threats. Take our quick “True or False” Cyber Warfare Threat quiz to gauge how well you understand the risk of malware attacks.

Read the source article at HR Daily Advisor

Time to get real. Cyber threats are everywhere.

Are you concerned about cybersecurity? You should be. We read of Russian meddling in our last election. We hear about ransomware attacks bringing large and small organizations to a standstill. Meanwhile, countless denial-of-service attacks seek to interfere with our favorite social media apps and services. Just last week we learned of widespread cyber hacking of our nuclear plants and power grid.

Read the source article at Washington Post
None

Mitigating cyber threats: Breaches show companies of all sizes need to plan ahead for cybersecurity

The malware attack against a Grand Rapids-based medical supplier serves as a reminder of the constant cyber threats businesses of all sizes face. Airway Oxygen Inc. reported to customers last month that it had been hit in mid-April by a ransomware attack that encrypted its data. The attackers accessed patient data on about 550,000 past and present customers and some 1,160 current and former employees.

Read the source article at mibiz.com
None

Security Hygiene Tips to Prevent Malware Infection & Stop Lateral Movement | Duo Security

Malware, ransomware, wipers, whatever you want to call them, they’re quite adept at spreading – whether across the web or laterally across your internal network. From stopping the initial point of infection to narrowing its path of destruction, here are some tips from the US-CERT (United States Computer Emergency Readiness Team) to help organizations of all sizes stay safe: Taking steps toward good security hygiene can help prevent initial malware infection.

Read the source article at The Trusted Access Company
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__xlqtxt1xarhmnqk.jpeg

Customers Seek Threat Protection Across WAN, Access and Data Center

Many of you are familiar with the WannaCry ransomware attack that struck businesses in over 150 countries worldwide in May 2017. Targets of the attack included huge corporations and organizations in the UK and U.S. in sectors as diverse as healthcare, telecommunications, logistics, manufacturing and even government. Now, with WannaCry barely in the rearview mirror, more recent headlines show a new generation of threats proliferating on a global scale at even faster rates.

Read the source article at Cisco Blog
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__iayzcaywgxvhq7c.png

NotPetya: Ransomware or Wiper? – Daily Security Byte

Is Petya 2.0 really ransomware, or is it a “false flag” nation state attack designed to damage organizations in the Ukraine, while distracting the press? That’s the question some researchers are asking of this new ransomware (or should I say wiper?). Today’s video covers some of the latest details from researchers reverse engineering Petya 2.0. […]

Read More – NotPetya: Ransomware or Wiper? – Daily Security Byte

Read the source article at Secplicity
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__d0dbqkt4ny9oalc.jpeg

June 2017: The Month in Ransomware

When it seemed that ransomware authors hit the lowest of the low with their attacks a long time ago, they managed to take it a notch further last month. With the revamped Petya Trojan that surfaced on June 27, the crooks broke new ground and started waging a real cyber war against a particular country. This toxic code renders computers inoperable, and paying the ransom does absolutely nothing.

Read the source article at tripwire.com
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__vmgiwucnmkw1wf5.jpeg

From Ransomware to Wiperware: The Politics of Analyzing a Cyberattack

Over the past few months, we’ve seen some major attacks and traumatic events worldwide. In fact, it seems that each time I stepped on or off a plane, some sort of major event had accompanied my arrival. For example, when I landed in Chicago last month, the WannaCry attack was all over the news, accompanied by political upheaval in the United States, France and the United Kingdom. As I flew to London the next week, the London Bridge attack was already underway.

Read the source article at certification.comptia.org
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__oz8327cltntwg0d.png

The 5 W’s of investigating cyber attacks

CSO magazine estimates that Cyber crime damages costs will hit $6 trillion annually by 2021. The recent WannaCry ransomware attack that affected over 100 countries and organizations in multiple industries was a stark reminder that cyber attacks are a very real threat. In 2016, there was a 600% increase in the number of ransomware attacks, a trend that seems set to grow without appropriate and rapid action.

Read the source article at us.smoothwall.com
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__k8dpmxonrycd3ix.png

The Biggest Cybersecurity Disasters of 2017 So Far

The first six months of 2017 have seen an inordinate number of cybersecurity meltdowns. And they weren’t just your standard corporate breaches. It’s only July, and already there’s been viral, state-sponsored ransomware, leaks of spy tools from US intelligence agencies, and full-on campaign hacking. And that’s just the beginning. Let this recap of 2017’s biggest cyber-incidents so far serve as a reminder of just how chaotic things have already gotten–and the year’s only halfway done.

Read the source article at www-wired-com.cdn.ampproject.org
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__ge0fyiifqp4qyip.jpeg

The Risky Business of Being Over-Exposed to Online Cybersecurity Threats

If your business is on the internet in Hong Kong, Samoa, or Zimbabwe, you are operating in one of the three countries in the world that are “most exposed” to cyberattacks, according to a June 14 report from security data and analytics software company Rapid7. Cybersecurity threats aren’t restricted by physical borders. Cyberattacks can happen anywhere and be associated with any device connected to the internet.

Read the source article at bna.com
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__e4kgvhrjdge8mib.jpeg

Updates to NotPetya Lead to Server Seizure at …

Police seized servers from Ukraine’s Intellect Service as the country scrambles to control a cyberattack allegedly conducted by advanced hackers. Ukrainian law enforcement has seized servers from software firm Intellect Service, makers of the M.E.Doc accounting software widely exploited last week in destructive cyberattack researchers report was conducted by highly skilled threat actors.

Read the source article at Dark Reading
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__j6en0xarcsvpksk.jpeg

Patch management could have stopped NotPetya attacks: Verizon

Good patch management could have stopped the spread this week of the NotPetya ransomware, says one of the world’s expert investigators of cyber breaches. “It’s interesting me they’re successful at all because they’re attacking known vulnerabilities,” David Ostertag, global security investigations manager at Verizon Enterprise Solutions, told Canadian reporters on Wednesday.

Read the source article at itworldcanada.com
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__ublnxnrte6fabd5.jpeg

22,000 patients affected by ransomware attack on Cleveland Medical Associates

Cleveland Medical Associates began notifying 22,000 of its patients of an April 21 ransomware attack that may have compromised patient data. The compromised computer was both locked and encrypted, and there is currently no evidence the patient data was impacted. The attack did not impact patient care at Cleveland Medical.

Read the source article at Healthcare IT News
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__uuwwkhrexvnwu1i.jpeg

As Ransomware Attacks Spike, Organizations Need to Catch Up

The latest operating systems provide better security than ever. But as the WannaCry outbreak demonstrated, many devices still run older, no longer supported operating systems, and many organizations and individuals became malware victims, in part, because of their reliance on those outdated systems. See Also: Spear Phishing, Identity Deception, Ransomware: How to Predict the Future of Crime Whose fault is that?

Read the source article at bankinfosecurity.com
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__yn6osh5u0kijf3p.jpeg

Petya: Prevention and Protection from New Ransomware Attack | Acronis

Another fast-moving ransomware attack is tearing across the globe, striking a number of high-profile businesses, transportation networks, public utilities and government agencies in Europe and the United States. The attack was initially focused in Ukraine and Russia. The National Bank of Ukraine saw ATMs across the country go down, and systems monitoring radiation at the former Chernobyl nuclear power plant were also affected. Russia’s largest oil company, Rosneft, was also hit.

Read the source article at acronis.com
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__j4stfjrsm1ll35u.jpeg

Who’s responsible for Cyber Security at my Company?

Many companies hold IT solely responsible for online information privacy and security, but experts agree that this is not a sustainable security business model. In an interview with the Wall Street Journal, Former CIA and NSA Director, Gen. Michael Hayden, calls cyber space “… the largest ungoverned space in recorded human history,” adding “there is no rule-of-law [online]”.

Read the source article at CyberTraining 365 Blog
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__mkipzaxsvnlnzmu.png

6 ways to develop a security culture in your organization

6 ways to develop a security culture from top to bottom With our modern dependence on technology and security, nobody would dare to make this statement. Everyone knows how crucial security is and how it must be embedded into everything an organization does. A simple glance at the news provides details on the data breach of the day tied to an application security vulnerability.

Read the source article at Home | TechBeacon
http://retailanditconsulting.com/wp-content/uploads/2017/07/curata__nu1phnmyrh2fmpi.jpeg