cybersecurity Archives - Adaptus

Welcome to Part 3, of "3 Compelling Reasons to Invest in Cyber Security".  In Part 1, I discussed assessing and prioritizing your organization's risks as well as commencing a risk assessment.  Part 2 involved the importance of assessing your organization's supply chain and including such details within the overall risk assessment.

Read More

The push to move everything into the cloud over the past several years has generated a large number of misconfigured and exposed deployments of various software stacks. This has attracted sophisticated attacks that destroy data or abuse server resources for cryptocurrency mining.

Read More
report

The Cybersecurity Strategy Report released on December 7 sidesteps the crises du jour by taking a bigger picture, practical and non-partisan view of what’s going wrong and how to fix things. It seeks to articulate how “traditional information technology (IT) strategies seem largely ineffective at stemming the growing tide of cybersecurity incidents.”

Read More
7 signs of insider threats

Why do insiders attack? Usually it will be for financial gain. Either someone is offering money for certain information, or they believe they can sell it online. Sometimes the motive will be revenge for a slight against them. It may be in retaliation for receiving a warning or disciplinary action or poor performance review, being passed up for a promotion or project, disagreements around salaries of bonuses, or being laid off. Sometimes it will be for a career benefit, for example taking contact details for customers or valuable intellectual property (IP) to a new employer.

Read More
predictions

The good news: advanced security technologies are constantly being brought to market. The not-so-good news: threat actors are not letting that get in the way; witness more intensified and ever more sophisticated attacks.

Read More
travel-by-plane

A little over three-quarters (77 percent) of workers say they connect to free or public WiFi while during travel. Some 63 percent will use public WiFi to access work emails and files. Those are just a couple top line findings from a chilling (if predictable) new digital security survey conducted by threat management company ObserveIT. The survey included […]

Read More
cyber puzzle

"When you have an enterprise that needs to secure data, you're leveraging these consumer devices that were never meant to be secured in the first place."

Read More
Brynjolfsson

The digital economy is set to unlock tremendous economic value for countries over time. But a common setback for the use of various new technologies is their vulnerability to hackers. That's because companies and individuals are not taking cybersecurity seriously, according to Erik Brynjolfsson, director at the MIT Initiative on the Digital Economy and a professor at MIT Sloan School

Read More

But no matter how much attention (or budget) is lavished on cybersecurity, executives need to understand that getting hacked isn’t a matter of if but when. This is the new normal in cybersecurity, and it changes the approach to preparation and risk management.

Read More

The number of cybersecurity choices facing chief information security officers, or CISOs, is truly overwhelming, according to those in the industry, as hundreds of “Best in Show” companies vie for rising corporate security budgets while claiming superiority for their small niche of the sector. The growing pressure to protect customer data, and with it, the company’s reputation, has given way to the idea of a Holy Grail of a central solution for cybersecurity.

Read More