3 Mistakes Never To Make When Evaluating Cybersecurity

Over the past decade, the cybersecurity market has exploded, and growth remains brisk. Cybersecurity Ventures expects that the cybersecurity spending globally will reach $1 trillion by 2021, up from an estimated $120 billion this year.

Despite this increased spending on security products and services, when it comes to protecting their digital infrastructure, organizations are struggling to stay ahead of the bad guys. One reason is a lack of due diligence when evaluating new vendors and their offerings.

Details

Risk-Based Cybersecurity In Finance: Step By Step Guide

A recent letter drafted by the Financial Services Roundtable (FSR) and sent to financial services companies promotes a risk-based cybersecurity approach. Noting the diversity of institutions, the FSR proposes moving away from imposing rigid requirements on all firms; and instead, holding individual firms accountable for customizing cybersecurity programs that align with their risk profile.

Details

Garbage Hardware

We have a term in our household that when any item with the thought to be ‘done with’, and is on its way to the trash is prefixed with term ‘Garbage’. While it’s not the most elegant term, it has stuck with most items. One of the best examples is when Garlic Bread gets a ‘little’ burnt. On its way to the trash, it usually gets intercepted by the men in the house and is lovingly referred to as Garbage Bread.Have an old Server? Is it a Garbage Server? Don’t throw it away just yet.

Details

Smart Devices have Made Us More Insecure than Ever

2017 was expected to be the year when Internet of Things would be the favorite prey for hackers, only for all the right reasons. The expectation was put forward by researchers and smart home analysts from around the world that by 2020, consumers and businesses would integrate as many as 50 billion smart home devices in their homes and offices. While smart devices are a great way to automate daily chores, they also make consumers vulnerable to attacks and infiltrations.

Details

Cutting the Cord…

Over the last twenty years, wireless has gone from a novelty to a necessity. Providing a wireless network is what encourages worker mobility as well as mobility of thought. But the challenges the wireless network present are daunting. Implementing security properly is paramount when designing and implementing a wireless LAN (WLAN). An organization needs to determine how to address Guest and BYOD postures while keeping known devices and users segregated from the rest of population.

Details

Cybersecurity in Post-WannaCry Era: Proceed with Caution

The back-to-back WannaCry and Adylkuzz outbreaks in mid-May mark a turning point on the cybersecurity landscape. Both attacks had far-reaching global ramifications—spreading chaos throughout all types of organizations—big and small.  But it looks like we got lucky.

For all of the disruption they caused, these attacks were surprisingly amateurish. Just think of the devastation a more developed attack could cause. But make no mistake—these attacks serve as a warning. Organizations need to heed the lessons learned and adjust their cybersecurity strategies accordingly.  

Details

Phishing Attacks Part 2: How to Protect Yourself Against an Attack

Phishing attacks are among the growing threats gaining popularity and creating havoc in the Internet world. In the previous blog, Phishing Attacks Part 1: Major History Moments to Learn From, 5 major attacks in history were detailed. As these type of attacks increase in diversity and complexity, it becomes increasingly important to minimize the chances of becoming a victim of a phishing attack.

Details

5 Risks Hospitals Face

Hospitals and the overall healthcare sector are experiencing a major digital evolution that is pushing them to change their traditional ways of information management. To close the gap with their needs and changing IT infrastructure agility, security, compliance, and performance, many organizations are probing for benefits of cloud. The traction of on-demand cloud services along with cloud security have swiftly changed the healthcare sector mindset from “why move to the cloud?” to “what and how should we move to cloud?”

Details

Machine Learning – Threat Detection Game Changer

In a past life I use to be part of a team that developed Video Games. Besides the storyboarding and coding that was part of the process, we also had to accommodate the idea that any user might try to ‘break’ the game in one way or another. We built in fail safes of all sorts to make sure that the game would always run as expected with a predicted outcome. Part of this process was to try and anticipate what type of nefarious action the player would make.

Details

WannaCry – Keep Calm and Remember the Basics

The globe was recently hit by a massive ransomware campaign that stretched across 150 countries and infected tens of thousands of systems. The Russian Interior Ministry was affected, certain NHS hospitals were turning patients away and a few manufactures had to cease operations. Needless to say, this was a really big deal. Companies were left scrambling on Friday afternoon in attempts to make sure they weren’t the latest victim of the WannaCryptor 2.0, also known as WannaCry, malware from wreaking havoc in their network. This is the second iteration of this malware and it uses exploits previously found within leaked NSA hacking tools (ETERNALBLUE) that takes advantage of a bug within Windows SMBv1 protocol.

Details

Brain Power: Using The Neuromorphic Data Microscope for Cybersecurity Analysis

Digital computers and human brains have different strengths and weaknesses. If you give me a long list of arthimetic problems to solve, at some point I’ll slip up. “How did I get the wrong answer on that division problem? Oh yeah, I thought there was a 3 in the tens place of the dividend when it’s actually a 6. I’ve just been staring at all of these numbers for so long that I’m starting to get tired!” But CAPTCHAs are easy for me to use, and they somehow impede malicious web bots that try to break through authentication barriers.

Details