(Updated from September 10, 2021)
by Maria Catricala, on Sep 2, 2022 12:18:34 PM
by Maria Catricala, on Aug 31, 2022 1:34:55 PM
Your company's network and data are accessible via endpoints. Desktops, laptops, smartphones, tablets, servers, workstations, and even Internet-of-things (IoT) devices are examples of endpoints. Securing those endpoints is important as a lot of data ends up going through those endpoints.
by Maria Catricala, on Aug 29, 2022 10:56:31 AM
by Maria Catricala, on Aug 26, 2022 10:16:15 AM
If you are starting a new business, you want to get on the Internet. Businesses like yours get on the Internet for many reasons, but the most basic one is that to gain and retain customers, you need to have an Internet presence. There is a risk associated with having an Internet presence. Whether you have an informational website, an eCommerce website, or are transferring data through the cloud, the benefits of being online do come with some risks.
by Maria Catricala, on Aug 24, 2022 10:16:40 AM
In general, resilience refers to the ability to bounce back quickly after adversity. Cyber resilience refers to being able to quickly recover from a cyber security challenge. In today’s cyber world, companies that are cyber resilient are the ones who will continue to thrive.
by Maria Catricala, on Aug 17, 2022 11:28:15 AM
The ability for online banking has made our lives simpler. We can bank from the comfort of our homes, or anywhere in the world without having to go to a physical branch. Cryptocurrency has also brought investors a new revenue stream that keeps on growing. While all this is great, there is a risk involved when it comes to using financial information on the internet.
by Maria Catricala, on Jul 29, 2022 11:17:59 AM
Compliance means: to conform by fulfilling requirements. In cybersecurity, compliance refers to fulfilling specific cybersecurity requirements, outlined by a governing body. In other words, government organizations, committees, and regulatory boards develop requirements (together called standards) outlining a baseline of cybersecurity protocols. For example, a requirement might be that organizations MUST have password restrictions in place, such as length, repetitiveness, and level of difficulty.
by Maria Catricala, on Jul 28, 2022 10:50:26 AM
Many organizations feel that being prepared for a ransomware attack is futile. This couldn’t be further from the truth as told by BleepingComputer. Their article about the REvil ransomware attack on Kaseya VSA customers mentioned that many victims refused to pay the ransom. The reason: Backups!
by Maria Catricala, on Jul 25, 2022 11:27:23 AM
The growth of ransomware continues, leaving many cybersecurity experts to wonder if there will ever be an end? The numbers for 2021 do not paint a good picture. Sophos says the average ransomware payment has increased to $812,260 compared with the 2020 average of $170,000. Worse still, the number of ransoms over $1 million has risen to 11% up from 4% in 2020.
by Maria Catricala, on Jul 22, 2022 12:28:30 PM
One of the biggest stories in cybersecurity has been the big increase in ransomware attacks. Even though ransomware is not a new threat, it seems that attacks are happening more frequently. Barracuda researchers reported that they’ve identified and analyzed 121 ransomware incidents so far in 2021, which is a 64% increase in attacks. The ransom demands are also getting bigger, with Palo Alto Networks’ Unit 42 finding the average ransomware payment had risen to $925,162.00 during the first 5 months of 2022. That is up 71% from 2021.
Get the latest information and cyber security news here!