-
Data Breaches & Cyber Security Budgets
Great info from @StuartMadnick on the escalation of #data breaches despite the increase in budgets and attention being spent on #cybersecurity. These increases are in part due to the overall evolution of #ransomware, misconfigured #cloud storage, and the targeting of small-business vendors. How are you working to #innovate along with #cybersecurity threats? If Companies Are So Focused on Cybersecurity, Why Are Data Breaches Still Rising?…
-
Cyber Security and Data Breaches
Great info from @StuartMadnick on the escalation of #data breaches despite the increase in budgets and attention being spent on #cybersecurity. These increases are in part due to the overall evolution of #ransomware, misconfigured #cloud storage, and the targeting of small-business vendors. How are you working to #innovate along with #cybersecurity threats? If Companies Are…
-
AT&T Data breach & Cybersecurity
The latest #databreach from AT&T is another example of the #cybersecurity threats that are ever present in our high-tech world. We rely so heavily on these companies to protect out #data and information which is becoming increasingly valuable as #tech intertwines with more of our everyday lives. It’s essential to take the preventative measures to…
-
IT Safety and Public Phone Charging Stations
As I have been traveling recently, great reminders from @JenniferKorn on #Itsafety while on the road. The FBI is warning against using public charging stations due to the risk of exposure to malicious software and #juicejacking. Cyber threats are lurking everywhere and it’s essential that we take the measures we can to protect our data. #cybersecurity #digitaldefense #dataprotection FBI warns consumers…
-
US Cyber Command
Great speech from the Deputy Secretary of Defense Kathleen Hicks (@DepSecDef) highlighting the constant need for vigilance and proactivity in IT security practices. As we continue to face increasingly sophisticated cyber threats globally, it’s essential that we remain intentional in the education and training of our end users; instilling an understanding on avoiding suspicious links…
-
Four Considerations for Manufacturing with the IIoT – James Gingerich
As you scale up your #SmartManufacturing, you need to be mindful of how this expansion relates to your internal #Cybersecurity programs as well. Great piece from @IIoT_World. #IoT#Manufacturing
-
Why Are Ransomware Attacks Against OT Increasing? – Tripwire Guest Authors
The “potential for destruction” is a definite threat to operational technology. However, steps like prioritizing OT #cybersecurity and requiring multi-factor authentication are two means of protecting against attacks on critical #data and #cloud services.
-
A New NSO Zero-Click Attack Evades Apple’s iPhone Security Protections, says Citizen Lab – Zack Whittaker
As cyber attacks evolve, we must adapt and keep ourselves ahead of the game. What anti-virus system does your company use? #CyberSecurity
-
Defending the COVID-19 vaccine rollout with best practices from the cybersecurity industry – Marc Rogers
Great piece by Marc Rogers @helpnetsecurity. It’s no surprise #cyberthreats are targeting the #CovidVaccine rollout, but thankfully we have the tools and #technology to stop a fair number of them.
-
Is Third-Party Software Leaving You Vulnerable to Cyberattacks? – Keman Huang, Keri Pearlson, and Stuart Madnick
As more big-name companies fall victim to #CyberAttacks, it may be time for your organization to review your approach to #Cybersecurity, especially if you’re utilizing third-party software. https://hbr.org/2021/05/is-third-party-software-leaving-you-vulnerable-to-cyberattacks?ab=hero-main-text