fbpx
Insider threats are among the most dangerous cyberthreats out there. Yet, organizations of all sizes seem to be either reluctant or negligent when it comes to fighting them. Over 50 percent of organizations don’t have an Insider Risk Response Plan and 40 percent don’t assess how effectively their technologies mitigate insider threats.1 Even though 59 percent of IT security leaders expect insider risks to increase in the next two years, very little is being done to prevent them from causing serious security incidents.
New Year, New Risks for IT & Data Security The COVID-19 pandemic has changed everything about the world as we know it. Just as we started embracing new practices like sanitizing, social distancing and remote working, the pandemic has also forced us to embrace systemic changes in the ways we deal with cyberthreats. In fact, the FBI has reported an increase in cyberattacks to 4,000 per day in 2020, which is 400 percent higher than the attacks reported before the onset of the coronavirus.
On December 13, FireEye discovered that SolarWinds Orion products (versions 2019.4 HF 5 and 2020.2 with no hotfix or 2020.2 HF 1) were being exploited by malicious actors. The supply chain attack trojanized SolarWinds Orion business software updates in order to distribute malware that has been referred to as both SUNBURST and Solorigate. As far as we know at time of publishing, this does not affect SolarWinds N-central or SolarWinds RMM. 
Rapid technological advancement and rising global connectivity is reshaping the way the world is functioning. From higher productivity to improved customer satisfaction, technology has played a critical role in the growth of businesses across the world. However, the consequential bad news is that technological advancements have also made organizations increasingly vulnerable to digital risks. However, this does not mean that businesses must compromise on growth and advancement for the sake of security.
For the third year running, we’ve examined the year’s biggest cyber threats and ranked them to determine which ones are the absolute worst. Somewhat unsurprisingly, phishing and RDP-related breaches remain the top methods we’ve seen cybercriminals using to launch their attacks. Additionally, while new examples of malware and cybercriminal tactics crop up each day, plenty of the same old players, such as ransomware, continue to get upgrades and dominate the scene.
The speed, convenience and anonymity of the Internet are making cyber crime a fast-growing activity. One recent study found that one in every five Americans has had personal information stolen or an account compromised because of their online activities.Need a cyber crime definition or examples? In addition to online identity theft or financial fraud, types of cyber crimes can also include activities such as stalking, bullying, hacking, email spoofing, information piracy and forgery and intellectual property crime.
Every now and then, an email with a catchy subject line appears in your inbox and you end up clicking on it, either because you’re curious about the subject line or because you assume the sender is trustworthy. Unfortunately, this is how most cyberattacks tend to begin – with a single click. What unfolds next only puts your security and the security of your business in grave danger.
Zoom Video Communications has announced its enhanced Two-Factor Authentication (2FA), that makes it easier for admins and organizations to protect their users and prevent security breaches right from the platform. The Two-Factor Authentication identifies online users by requiring them to present two or more pieces of evidence, or credentials, that authenticate their ownership of the account, such as something the user knows (a password or pin), something the user owns (a smart card or mobile device), or something the user has (fingerprints, voice).
Page 1 of 4