Watch what you surf: Your digital footprints not only hurt privacy but also affect cybersecurity
When you use the internet, you leave behind a trail of data, a set of digital footprints. These include your social media activities, web browsing behaviours, health information, travel patterns, location maps, information about your mobile device use, photos, audio and video.
Cybersecurity as a business decision: a manifesto
Cybersecurity is now the number one spend item on the technology investment list. In 2022, 88 percent of boards say that cybersecurity is a business issue, not a technical one. Unfortunately, boards have no idea how to govern cyber AS a business issue and executives have no idea how to guide cyber investment as a business issue.
In charts: Cyber security risks and companies’ readiness
Cybersecurity concerns could once be written off as the preserve of large companies. But, in today’s networked world — where many are still partly working remotely as a result of the pandemic, and Russia’s invasion of Ukraine is raising cyber warfare threats — that era is long gone.
Top 10 cybersecurity Measures C-Suite Executives Should Follow
Cybersecurity threats are only on an upward trajectory with more data available online for a varied number of reasons and the incidence of cases is only going to increase. It’s not even been days Nvidia, a multinational technology company was cyber-attacked, Samsung, a global giant got the blow. This proves not even big companies, which in general have data- protection strategies in place, are safe. This brings us to an important question: Are our technological solutions so vulnerable or the people at the helm of things throw caution to the wind?
How to move beyond cybersecurity compliance in healthcare? Focus on clinician workflows
MIAMI — Compliance is a key metric used in healthcare security conversations, measured of course against state and federal regulations, including the The Health Insurance Portability and Accountability Act. But arriving at “compliant” in no way equates to a strong cyber posture. And it’s a driving cause of why smaller and mid-sized organizations are still struggling to keep pace.
CISA publishes guide with free cybersecurity tools, resources for incident response
The US Cybersecurity and Infrastructure Security Agency (CISA) is responsible for monitoring, managing, and reducing risk to the country’s critical infrastructure. The federal agency is also known for issuing alerts relating to high-profile data breaches and vulnerability disclosures.
Three Ways To Enhance Supply Chain Cybersecurity
It’s a familiar headline: Your supply chain may be your biggest cybersecurity risk. And for good reason. Between pressure to maintain business continuity and exceed profits amid inflation and global supply chain issues, organizations across industries have a lot to contend with. This focus elsewhere can lead to threat actors slipping under the radar more easily while also making a big splash.
‘Data leaks from within, a key cybersecurity threat’
Smart and trustworthy employees are a firm’s greatest assets. However, the problem arises if one of them resigns or is asked to go and takes with him or her confidential data that can give your firm’s competition an edge.
What you need to know about cybersecurity in 2022
The pandemic has also shown us just how interconnected all businesses are and how increased digitalization has thrust the global population onto a new trajectory of cyber threats and attacks. In 2021, we saw critical infrastructure breaches and how one company’s cybersecurity can have a cascading effect on many others, from direct customers to end consumers, up and down the US’ Eastern Seaboard.
Small Business Cybersecurity: What Will Be Different in 2022?
Every year, new tips come out about small business cybersecurity. But the advice for 2022 isn’t all that different from previous years. For instance, the U.S. Small Business Administration (SBA) talks about phishing, viruses, ransomware, strong passwords and protecting confidential information this year. Their tips on staying safe are an excellent resource that businesses should read over more than once. But can small businesses benefit from advice beyond what is now considered basic online hygiene?
Remote Work and the New Normal for Enterprise Cybersecurity
Work from home has quickly taken over in many enterprises due to the recent crisis. For some organizations, it has come as a blessing because they can reduce fixed capital costs in segments like office real estate. In addition, it has allowed these companies to source the best talent without having to worry about geographical constraints.
Ten cybersecurity resolutions for a safer 2022
New year, new resolutions — here are ten cybersecurity practices we think that you and your business need to usher a safe and cyber-secure 2022: Prioritize cybersecurity, Don’t neglect data protection and privacy, Passwords are not enough, Zero-trust is your friend, Beware of tech support scams …
13 Cybersecurity Predictions for 2022
Cybersecurity will continue to be a grave concern for business leaders in 2022. Malicious and accidental threats, coupled with increasingly stringent data regulations, are putting the onus on companies to step up their security and data use precautions. ere, data security leaders share their thoughts on what’s ahead both in terms of new dangers to data and opportunities to thwart them.
Five cybersecurity myths that need to be busted
According to Barry O’Donnell, Chief Operating Officer at TSG, while cybersecurity is important it is equally important to dispel the myths that surround the subject. O’Donnell tells Digital Journal that poor cybersecurity has been identified as the most pressing threat to businesses today. Issues with cybersecurity often stem from a lack of cybersecurity awareness.
Cybersecurity trends to watch out for
It almost beggars belief that a supposedly secure QR code designed for online payment transactions could allow an intruder to invade personal bank accounts to steal money. If an everyday activity like making digital payments is vulnerable to such complex cyber frauds, one can only fathom the large-scale damage a cyber-criminal can cause. Trespassing into an enterprise’s private data lake is worth potentially millions and even billions of dollars.