Security News
Data breach episodes have been constantly rising with the number of data breach victims crossing 1 billion in the first half of 2024. A recent Data Breach Report 2023 by Verizon confirms that 74%...
2023 was a year of unprecedented cyberattacks. Ransomware crippled businesses, DDoS attacks disrupted critical services, and data breaches exposed millions of sensitive records. The cost of these...
Think you're too small to experience a cyber attack? That's not the case. Cyber threat actors are increasingly setting their sights on small businesses.
Strengthening your cyber defenses can be a daunting task. Where do you start? Which tools do you use? How much will it cost? And, what do you risk losing if you do nothing? It’s not always easy to...
How can your business reduce the risk of a successful cyber attack and create a defendable network? Don't underestimate the risk that unsegmented networks pose by believing that they improve operational efficiency and reduce network complexity.
Thousands of organizations have already made the move from traditional spreadsheet tracking of CIS Controls implementation to take advantage of CIS CSAT and improve their cyber hygiene. How to access CIS CSAT. There are two versions of CIS CSAT: a CIS-hosted version and an on-premises version called CIS CSAT Pro.
The report found that while 81% of those surveyed consider their security to be above average or exceptional, many lack basic cyber hygiene - 41% lack a password complexity requirement, one of the cheapest, easiest forms of protection, and only 55.6% have implemented multi-factor authentication. "The loss of data and resources due to ransomware attacks can be debilitating. Though organizations are taking this threat seriously, too many are failing to take basic preventative steps. This report indicates a disturbing misplaced confidence that defenses never fail or that paying a ransom after an attack will always work - they do, and it won't," said Ted Ross, CEO of SpyCloud.
A study of exposed web-app attack surface reveals that insurance companies are not good at keeping their own security house in order. Kids with sports cars pay high motor insurance premiums and houses built on flood plains have high home insurance premiums.
Constella Intelligence released the results of a survey that unlocks the behaviors and tendencies that characterize how vigilant organizations' leaders are when it comes to reducing cyber vulnerability, allowing the industry to better understand how social media is leveraged as an attack vector and how leaders are responding to this challenge. Cybersecurity leaders not paying much attention to cyber hygiene.
Throw in the word "Basic," and voila! You've got basic cyber hygiene. Basic cyber hygiene is where a group of experts set a minimum set of cybersecurity standards with the expectation that everyone can/should follow.