cybersecurity Archives - Adaptus
7 signs of insider threats

Why do insiders attack? Usually it will be for financial gain. Either someone is offering money for certain information, or they believe they can sell it online. Sometimes the motive will be revenge for a slight against them. It may be in retaliation for receiving a warning or disciplinary action or poor performance review, being passed up for a promotion or project, disagreements around salaries of bonuses, or being laid off. Sometimes it will be for a career benefit, for example taking contact details for customers or valuable intellectual property (IP) to a new employer.

Read More
predictions

The good news: advanced security technologies are constantly being brought to market. The not-so-good news: threat actors are not letting that get in the way; witness more intensified and ever more sophisticated attacks.

Read More
travel-by-plane

A little over three-quarters (77 percent) of workers say they connect to free or public WiFi while during travel. Some 63 percent will use public WiFi to access work emails and files. Those are just a couple top line findings from a chilling (if predictable) new digital security survey conducted by threat management company ObserveIT. The survey included […]

Read More
cyber puzzle

"When you have an enterprise that needs to secure data, you're leveraging these consumer devices that were never meant to be secured in the first place."

Read More
Brynjolfsson

The digital economy is set to unlock tremendous economic value for countries over time. But a common setback for the use of various new technologies is their vulnerability to hackers. That's because companies and individuals are not taking cybersecurity seriously, according to Erik Brynjolfsson, director at the MIT Initiative on the Digital Economy and a professor at MIT Sloan School

Read More

But no matter how much attention (or budget) is lavished on cybersecurity, executives need to understand that getting hacked isn’t a matter of if but when. This is the new normal in cybersecurity, and it changes the approach to preparation and risk management.

Read More

The number of cybersecurity choices facing chief information security officers, or CISOs, is truly overwhelming, according to those in the industry, as hundreds of “Best in Show” companies vie for rising corporate security budgets while claiming superiority for their small niche of the sector. The growing pressure to protect customer data, and with it, the company’s reputation, has given way to the idea of a Holy Grail of a central solution for cybersecurity.

Read More

The White House and the Department of Homeland Security have finished a government wide review examining the security of federal agencies, and the results aren’t pretty. Dozens of federal agencies have cybersecurity programs that aren’t properly equipped to deal with cyber intrusions in their networks, according to a new report released by the White House […]

Read More
healthcare

“Hackers are becoming more sophisticated and we expect to see greater frequency and intensity of cyberattacks in healthcare,” CynergisTek CEO Mac McMillan said in a statement. “The NIST CSF gives healthcare organizations the framework they need to build the resilience that 21st century healthcare is going to require.”

Read More
Category One

This week, the head of Britain’s National Cyber Security Centre (NCSC), Ciaran Martin, said something rather alarming in a newspaper interview that generated plenty of headline heat – the UK has never suffered the most serious category one (C1) cyberattack but it is only a matter of time before it does.

Read More