In the tense political and economic climate, state-backed actors have used every possible means to gain leverage over their rivals. And in the midst of the chaos, every individual and organization can become a victim or collateral damage in the context of bigger conflicts. Here’s a glimpse of where we are and how organizations can protect themselves going forward.
In it's The State of Email Security report, Mimecast reports that 79% of security leaders indicate their companies had experienced a business disruption, financial loss or other setback in 2020 due to lack of cyber preparedness.
Independent research conducted by Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey, and sponsored by HP Inc. found a 100% risein ‘significant’ nation state incidents between 2017-2020. Analysis of over 200 cybersecurity incidents associated with nation state activity since 2009 also shows the enterprise is now the most common target (35%), followed by cyberdefense (25%), media and communications (14%), government bodies and regulators (12%), and critical infrastructure (10%).
In 2020, organizations fast-tracked digital transformation and cloud migrations to provide remote capabilities to employees, customers and overall processes. Many times, these programs were started without a proper threat landscape analysis. In 2021, it’s important to revisit any rushed decisions made in 2020 that could impact a company’s digital footprint and cybersecurity.
While password spraying results in the infiltration of many accounts every year, it’s also one of the easiest attacks for cyber-aware employees to thwart. In other words, password spraying needs to be a top consideration for any successful cybersecurity platform.
When it comes to cybersecurity, companies still have a lot of work to do to find ways to anticipate and avoid data breaches. Let’s take a look at a few of the most notorious cybersecurity attacks that have happened over the last few decades and see what you and your enterprise can learn.
The goal of the partnership is to improve the training and education of the workforce in support of cybersecurity protection and resilience along with supply chain risk management.
One way to achieve higher security in your enterprise is to instill a proper Privileged Access Management (PAM) initiative into the cybersecurity workflow. For a multi-dimensional cybersecurity strategy involving processes, technology, and people to be successful, any such system has to be a part of the entity’s culture. Here’s how to implement PAM at your organization.