In mid-March, the Cybersecurity and Infrastructure Security Agency (CISA) released a report highlighting how cyber actors routinely exploit poor security configurations, weak controls, and other poor cyber hygiene practices to gain access and compromise user systems.
» Read MoreIn 2022, the greatest threat vector is phishing attacks, which are responsible for more than 80% of all breaches to individuals and organizations. These are a result of misused or stolen passwords; hackers, despite their name, don’t “hack in”, but instead log in using credentials phished via social engineering.
» Read MoreThe year 2020 will be remembered as the year in which the world suffered one of the worst viral pandemics and one of the worst cyber pandemics in history, simultaneously. As COVID-19 spread rapidly throughout the global population, a breach on IT firm SolarWinds started a supply-chain attack of an unprecedented magnitude, affecting thousands of organizations, including the Pentagon; the White House; the US Army; the US Departments of Treasury, Commerce, and Energy; IT giants like Microsoft, Cisco, Deloitte, Intel; and others.
» Read MoreWorryingly, drivers of connected vehicles may not control their car, says Julia O’Toole, founder of security company MyCena. All the vehicles’ internet-facing communications are entry points to hijack your car or tamper with signals; it’s a serious matter for the auto industry.
» Read MoreUse multi-factor authentication and protect yourself from ransomware, at least that’s what dozens of government and cybersecurity experts advised. Even the Cybersecurity and Infrastructure Security Agency (CISA) states in its website: “MFA increases security because even if one credential is compromised, unauthorized users will not be able to meet the second authentication requirement and will not be able to access the target physical space, computing device, network, or database.”
» Read More