Tag: Risk Management

Phishing attacks hit financial services, tech companies hardest: How to stay safe

Phishing attacks skyrocketed in the financial services industry and IT sector early this year, according to a new report from Kaspersky Lab. Over a third (35.7%) of phishing attempts were in the financial services industry, with the IT sector coming in second at 13.83%.

The report also found that more than half (54%) of companies receive phishing emails regularly, leaving companies at a constant threat of attack.

Read more about the findings of the new Kaspersky Lab report and learn how to stay safe from phishing attacks, on TechRepublic.

Cyber hygiene: Where do organizations fall behind on basics?

Tripwire released its State of Cyber Hygiene report, which examined how organisations are implementing security controls that the Center for Internet Security (CIS) refers to as cyber hygiene.

The survey found that almost two-thirds of the organisations admit they do not use hardening benchmarks, like CIS or Defense Information Systems Agency (DISA) guidelines, to establish a secure baseline.

Read more about the disconcerting findings of the new Tripwire report on Help Net Security.

There’s a global divide in how organizations assess cyber risk

Nearly 48 percent of organizations globally have embraced strategic vulnerability assessment – defined as mature or moderately mature programs that include targeted and tailored scanning and prioritizing computing resources based on business criticality – as a foundational element of their cyber defense, a new Tenable report has revealed.

Of those organizations, however, only five percent display the highest degree of maturity, with comprehensive asset coverage as a cornerstone of their programs. On the other end of the spectrum, 33 percent of organizations take a minimalistic approach to vulnerability assessments.

Read more about the findings of the new report on Help Net Security.

IoT security: Lessons we can learn from the evolution of road safety

In the world we know today, road safety is carefully enforced to the point where we take it for granted. But it wasn’t always thus. People simply weren’t aware of the risks. In the past there were no uniform traffic safety regulations and no safety precautions built into vehicles, such as seatbelts or no airbags.

We’re currently facing serious security challenges with the Internet of Things, and the parallels with road safety are striking. The number of connected devices offered in the market rises inexorably and the low cost of manufacturing often relegates good security to an afterthought.

Read more about what cybersecurity professionals can learn from the evolution of road safety in order to improve IoT security according to Brian Honan, CEO of BH Consulting, on Help Net Security.

Preventing IDN homograph attacks from harming your brand/reputation

Before the advent of internationalized domain names (IDN), observant Internet users could easily spot domain impersonation attempts since they would look almost cartoonish.

“In recent years, though, the Internet technical community has made it possible to express domain names in the native character sets of most nations and cultures on Earth, and that has really boosted the capabilities available to malicious impersonators,” says Dr. Paul Vixie, CEO of Farsight Security.

Read more about how scammers and phishers exploit IDNs to register domains that, to users, look very much like those of popular online resources, and learn how you can protect your organization against IDN homograph attacks, on Help Net Security.

Security as a Quality Gate for DevOps

It’s hardly a controversial statement to say that DevOps is changing the way that organizations build and deploy applications. There’s plenty of material, stories, whitepapers and whole companies that demonstrate this trend. There are, however, a couple of things that make a discussion about security and DevOps important.

First, while there are a lot of organizations that have adopted DevOps tools and processes, there are many, many more that haven’t. In other words, DevOps is still fundamentally an early-stage technological movement. The second reason is that DevOps is set to transform security, and no one is quite sure what that means, though there are a lot of opinions on the topic.

Read why Tim Erlin, VP of Product Management & Strategy at Tripwire, believes that any DevSecOps discussion should start by looking at the pervasive industry problems, and learn what these problems are, on Tripwire.

Risks associated with third-party access

We all know that an insider threat is often the biggest challenge an organization needs to be equipped to deal with.  Some of the most infamous breaches in recent history have been the result of “trusted” insiders who have turned to the dark side. The other, rather obvious threat is from the unknown attackers who are probing our environment looking for weaknesses and exploiting them for fame, money, or just because.

So, is that it?  There are only people inside our networks and bad actors outside? Well, according to Joe Campbell, Principal Security Advisor at One Identity, there’s a middle ground that we need to remember and that is the 3rd party partner.

Read why Joe Campbell believes that 3rd party partners, who are neither trusted insiders nor external threats, may be your biggest challenge yet, on CSO.

4 Reasons Why Companies Are Failing at Incident Response

The cybersecurity threat landscape continues to evolve and expose companies in all sectors to breaches. In 2018 alone, a diverse range of companies have been victimized.

Not only are threats escalating in scope and sophistication, new smart technologies — particularly those leveraging the Internet of Things — can add fuel to the fires that security staff need to fight. These are often not fully tested for security flaws, which create hard-to-defend gaps for companies trying to proactively defend and protect their networks and assets. In addition to prevention becoming increasingly difficult, many organizations are also failing at incident response.

Read about the four main reasons why organizations struggle to detect, contain, and remediate threats, on DarkReading.

Ransomware Attacks: A Quantum Leap from Quantity to Quality

The cybersecurity attack landscape moves fast, really fast. Last year, not a week passed that didn’t bring about news on a new ransomware incident. Fast forward a year and by all accounts ransomware incidents are on the decline – by as much as 32% according to some reports.

Dig a little deeper and we see that, for enterprises, the ransomware threat is actually not going away anytime soon. For while attack volume may have declined, ransomware attacks have evolved to be more sophisticated, targeted and effective against unsuspecting users and unprepared organizations.

Read more about the evolution of ransomware attacks and learn how you can protect your organization from this threat on Security Magazine.

Google: We’ll warn you if government hackers are attacking your company email

Google is adding a feature to alert organisations running its G Suite office package if it believes one of their user accounts is being targeted by government-backed hacking.

If an organisation’s G Suite admin turns the feature on (it’s off by default), he or she will receive an email alert if Google believes a government-backed attacker has attempted to access a user’s account or computer via phishing, malware, or another method.

Read more about Google’s new feature that warns organisations if staff are being targeted by government-backed hackers on TechRepublic.