IBM selected six school districts to receive its IBM Education Security Preparedness Grant, which totals $3 million. The in-kind grant was created to help United States K-12 public school districts proactively prepare for and respond to cyberattacks.
In the tense political and economic climate, state-backed actors have used every possible means to gain leverage over their rivals. And in the midst of the chaos, every individual and organization can become a victim or collateral damage in the context of bigger conflicts. Here’s a glimpse of where we are and how organizations can protect themselves going forward.
In it's The State of Email Security report, Mimecast reports that 79% of security leaders indicate their companies had experienced a business disruption, financial loss or other setback in 2020 due to lack of cyber preparedness.
Independent research conducted by Dr. Mike McGuire, Senior Lecturer in Criminology at the University of Surrey, and sponsored by HP Inc. found a 100% risein ‘significant’ nation state incidents between 2017-2020. Analysis of over 200 cybersecurity incidents associated with nation state activity since 2009 also shows the enterprise is now the most common target (35%), followed by cyberdefense (25%), media and communications (14%), government bodies and regulators (12%), and critical infrastructure (10%).
In 2020, organizations fast-tracked digital transformation and cloud migrations to provide remote capabilities to employees, customers and overall processes. Many times, these programs were started without a proper threat landscape analysis. In 2021, it’s important to revisit any rushed decisions made in 2020 that could impact a company’s digital footprint and cybersecurity.
While password spraying results in the infiltration of many accounts every year, it’s also one of the easiest attacks for cyber-aware employees to thwart. In other words, password spraying needs to be a top consideration for any successful cybersecurity platform.
When it comes to cybersecurity, companies still have a lot of work to do to find ways to anticipate and avoid data breaches. Let’s take a look at a few of the most notorious cybersecurity attacks that have happened over the last few decades and see what you and your enterprise can learn.