5 reasons to update the enterprise IoT security roadmap

As the ever-growing Internet of Things becomes a staple in households across America through smart, connected devices, the risk of security breaches is a concept brought to the average consumers’ (at times, actual) front door. The growth in security concerns — ranging from the fear of an intruder virtually flipping a door lock to a hacker taking down a power grid — comes from increasing threats from obsolete systems and protocols that haven’t updated to meet the security requirements of the growing ecosystem of connected devices. Weaknesses in platform security could push existing smart home owners to uproot their whole system …

Read the source article at information-age.com
None

Nordic digitisation brings unwanted consequence of heightened cyber security risks

Major cyber attacks and security breaches often make headline news these days – and their impact on the Nordic region has been growing. The rapid digitisation of Nordic life has brought with it opportunities for criminals and, according to Jarno Limnéll, professor of cyber security at Finland’s Aalto University and vice-president of Insta Group, there are two key reasons for this. “Firstly, our societies and business life are getting increasingly digitised,” he said.

Read the source article at computerweekly.com

Challenges in Cyber Security for Business

The advancement of technology and continuous improvements in the field of data storage, information processing, and artificial intelligence have enabled businesses to perform highly complex tasks with efficiency, accuracy, and in the shortest possible span of time. However, with growing independence on our computers and laptops for even the most trivial and easiest tasks have made us vulnerable to IT security issues or otherwise called cyber security issues.

Read the source article at Latest news

Top 5 Questions to Ask Your Vendors about Their Security Policies

Cyber security is one of the most critical issues the U.S. faces today. The threats are real, and the need is pressing. The cyber security status is unstable, especially considering the enormous and growing scope of the threats. Thus, cyberspace’s dynamic nature must be acknowledged and addressed by policies that are equally adaptive. As many breaches have happened previously via targeting vendors first, there is a need to address cyber threats associated with the vendors.

Read the source article at InfoSec Resources
None

This is where your cybersecurity system isn’t working

The enterprise workplace is filled with web-connected touchpoints that offer improved agility, productivity, efficiency and computing power. Unfortunately, those same touchpoints can also represent security threats, especially if your organization’s cybersecurity system isn’t comprehensive in how it protects the entire network.

Read the source article at Mobile Business Insights

At hacker summit, a new focus on preventing brazen attacks

LAS VEGAS — Against a backdrop of cyberattacks that have grown into full-fledged sabotage, Facebook chief security officer Alex Stamos is bringing a new message to hackers and security experts at the Black Hat conference.

In short: it’s time for hackers once known for relatively harmless mischief to shoulder responsibility for helping detect and prevent major attacks.

Read the source article at StarTribune.com

Crypto-cash investors duped in funding scam

The popularity of Bitcoin kicked off a rush to mint novel e-currencies Cyber-thieves are believed to have stolen about $500,000 (£390,000) in the Ethereum crypto-currency, with an investment scam. The thieves hijacked the website of finance security start-up Enigma and posted messages saying it was about to launch its own currency. Many people keen to cash in transferred ethereum to the thieves’ account.

Read the source article at BBC – Home

Lack of cyber hygiene leaves 90% of businesses vulnerable to hacks | National Cyber Security Ventures

90% of businesses report exploits of vulnerabilities dating back three or more years, leaving them open to hacks. The vast majority of businesses are recording exploits for vulnerabilities that are three or more years old, with just over half reporting 10 year old vulnerabilities. That’s according to Fortiguard, which found in its Q2 data that there were a total of 184 billion exploit detections, 62 million malware detections and 2.9 billion botnet communications attempts.

Read the source article at National Cyber Secuirty University

5 Things E-commerce Business Owners Should Know About Cybersecurity

The e-commerce market is constantly growing as there are new online businesses being opened every single day. And every company that sells stuff online holds onto each of their customers’ personal information. Because of this, e-commerce businesses are quite attractive to hackers and there are tons of companies who unfortunately had to deal with hacker attacks on their databases.

Read the source article at IT Communities

Climbing the Security Maturity Ladder in Cloud

These five steps will insure that you achieve the broadest coverage for onboarding your most sensitive workloads. Astute CIOs are actively migrating to public cloud to take advantage of scalability, flexibility and inherent security at a lower cost. As Rob Alexander, CIO Capital One, said at the AWS re:Invent 2015 conference in Las Vegas, “We can provide higher security with AWS than with our own data centers.”

Read the source article at Dark Reading

Security Professionals Risk Breaches By Turning Off Security To Please The Business

CUPERTINO, Calif. Bromium®, Inc., the pioneer and leader in virtualization-based enterprise security that stops advanced malware attacks, today released results of a survey of 175 security professionals conducted at this year’s InfoSecurity Europe, which found that IT security is often deprioritized when it interferes with employee productivity.

Read the source article at home – Information Security Buzz

Why IoT Security Is So Critical

Twenty years ago, if you told me my phone could be used to steal the password to my email account or to take a copy of my fingerprint data, I would’ve laughed at you and said you watch too much James Bond. But today, if you tell me that hackers with malicious intents can use my toaster to break into my Facebook account, I will panic and quickly pull the plug from the evil appliance.

Read the source article at TechCrunch

New Cyber Attacks Mean Back to Basics

In the wake of the Petya/NotPetya Ransomware/NotRansomware outbreak, security researchers and vendors are cashing in with blog posts, analyses, and expert advice on how to avoid becoming the next victim. The aim of all this noise is, partially, to help organizations understand the details of the attack, how it succeeded (is succeeding), and what controls can be implemented to avoid or mitigate damage.

Read the source article at MIS Training Institute

Top 3 Essentials in Preparing for Ransomware Attacks

July 18, 2017 – With each week seeming to bring in a report of a new ransomware attack, healthcare organizations cannot afford to assume that this type of cybersecurity issue will never affect them. Preparing for ransomware attacks in the healthcare industry needs to be a top priority for organizations of all sizes. Developing a comprehensive approach to data security needs to evolve with the cybersecurity threats plaguing the industry.

Read the source article at healthitsecurity.com

8 simple cyber security tips for small business owners – Flying Solo

While having a personal IT guru is out of reach for most of us, your data will thank you for following these simple security tips. It’s safe to say that the world is more connected than ever. For small businesses, this means huge opportunities. It’s easier now to compete on the big stage, sell your products and services and save on administration costs. With this in mind, it’s important you’re equipped to deal with cyber security threats.

Read the source article at Flying Solo

The Lessons of WannaCry Attack

On May 12, what experts are calling “the largest ransomware infection in history”[1] was launched against more than 200,000 computer targets in 150 countries. Called “WannaCry,” the hack cast a harsh light on the growing threat of ransomware, and that of Distributed Denial of Service (DDoS) attacks in general. In global research that was released by Neustar, ransomware experienced in concert with DDoS attacks have increased 53% from 2016.

Read the source article at csoonline.com

WannaCry and (Non) Petya prove we’re missing a security beat industry-wide

For the second time in just a few weeks, British companies were exposed to ransomware attacks that their ageing security infrastructures couldn’t withstand. Not only did these malicious acts hold personally identifiable information to ransom, they also impacted medical procedures, airline travel and corporate share prices. WannaCry as well as (Non) Petya relied on unpatched systems as an attack vector and helped to highlight businesses’ internal vulnerabilities.

Read the source article at ITProPortal

It’s time for businesses to step up on security – Information Age

In this digital age navigating information security can feel like a minefield. Cyber criminals are getting smarter, data breaches are making headlines nearly every day and regulations are due to come into force which could see organisations fined 4% of annual global turnover or €20 million for any given data breach. Whichever is greater. Needless to say cyber security is now high on the agenda for the c-suite.

Read the source article at information-age.com

Employees are your biggest risk: Data hygiene needs to start at the top

From the recent WannaCry malware attack, which affected organisations across the globe, to the ongoing allegations of nation state cyber espionage, cyber security is never out of the news. To help tackle this ever-evolving threat landscape, there’s a whole host of tools and services available to businesses that offer everything from antivirus software to network monitoring, threat intelligence and authentication systems.

Read the source article at City A.M.

10 Essential Cyber Security Solutions for Small Businesses

Are you a small business owner who regularly collects and stores personal information from your customers, employees, and business partners to provide products and services? Are you a small business owner who regularly collects and stores personal information from your customers, employees, and business partners to provide products and services?

Read the source article at Broowaha
None

10 Essential Cyber Security Solutions for Small Businesses

Are you a small business owner who regularly collects and stores personal information from your customers, employees, and business partners to provide products and services? Are you a small business owner who regularly collects and stores personal information from your customers, employees, and business partners to provide products and services?

Read the source article at Broowaha
None

10 Essential Cyber Security Solutions for Small Businesses

Are you a small business owner who regularly collects and stores personal information from your customers, employees, and business partners to provide products and services? Are you a small business owner who regularly collects and stores personal information from your customers, employees, and business partners to provide products and services?

Read the source article at Broowaha
None