In light of the reports of theft of COVID-19 stimulus checks (which one headline called “pure hell”), it’s instructive to look back at recent breaches of IRS systems and processes.
Cybersecurity professionals, responsible for securing their organizations’ digital assets, are seeing their job function has changed during the coronavirus pandemic, new research shows. Ninety percent say they are now working remotely full-time.
The COVID-19 pandemic has created an environment in which malicious cyber actors thrive. They are exploiting today’s uncertainty and anxiety through ransomware attacks, phishing campaigns, social engineering and financially-motivated scams. Although we are living in unprecedented times, the cyber threats we face and the malicious actors we defend against are not new. But the globe’s singular focus on COVID-19 may make us the proverbial fish in a barrel for bad actors.
New KnowBe4 study, The Rise of Security Culture, finds that the majority of security leaders (94 percent) say security culture is important for business success, but have yet to merge their security strategies with their overall business strategies.
Mimecast Limited released the latest report from the Cyber Resilience Think Tank highlighting four trends for building and operating a Security Operating Center (SOC).
Gibbs & Cox, Inc., a leader in naval architecture and marine engineering, announced that Brian Hobbs, a cybersecurity and information technology executive, has joined the company as Chief Information Officer.
While employees are the key to identifying cybersecurity vulnerabilities quickly, many companies have failed to create a welcoming environment for whistleblowers. During COVID-19, how can you safely blow the whistle?
To detect and contain breaches faster, it’s become increasingly important to go beyond the typical malware detection capabilities and invest in the ability to detect and react to lateral movement within the environment. Lateral movement is a core piece of an attacker’s strategy once he’s gained a foothold within the environment. What three steps can you take to help stop lateral movement focus on security measures that minimize dwell time?
To find out why people adopt and then sometimes abandon online safety measures, researchers from the University of Michigan School of Information and NortonLifeLock’s Research Group surveyed more than 900 people about their use of 30 commonly recommended practices to guard against security, privacy and identity theft risks.