The increasingly connected home is a vulnerable part of the extended enterprise, especially as the line blurs between personal life and work, says Forrester principal analyst Heidi Shey. She encourages organizations to adopt a two-pronged approach to protecting the "work from home" workforce.
Most organizations deploy defenses to reduce the risk of cyber threats entering their environment. But what about the threats that are already inside? Whether the result of malicious, negligent or compromised users, insider threats pose serious business risks, and most organizations just aren’t prepared.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including how the ransomware-as-a-service model shifted in 2021, the rise of fraud in faster payments and how to prevent it, and one CISO's take on the state of the industry.
Michael Lines is working with Information Security Media Group to promote awareness of the need for cyber risk management, and as a part of that initiative, the CyberEdBoard will post draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself." This post's chapter is...
As the workplace quickly evolves, people are working from everywhere
and accessing data from anywhere. Suddenly, CISOs must manage not
just external threats but countless risks from within, which always prove
more elusive and harder to detect or prevent than traditional external
ones. While the most common insider...
The saying "Penny-wise, pound-foolish" is relevant when we talk to those friendly, knowledgeable finance people about ongoing employee screening due to the dreaded insider threat and the costs associated with it - which leads to us pulling out our hair in utter frustration. This rant is about that.
As the COVID-19 pandemic persists, cybersecurity threats and related risks continue to grow, including ransomware, external threats and especially those involving healthcare insiders, says Denise Anderson, president of the Health Information Sharing and Analysis Center.
In the latest weekly update, four ISMG editors discuss: a federal judge imposing the maximum sentences on a hacker who pleaded guilty to conspiracy and aggravated identity theft, regulators getting tougher on cryptocurrency lending platforms and the return to in-person roundtables.
A new self-assessment tool aims to help public and private sector organizations assess their level of vulnerability to insider threats, according to CISA. The agency also indicated this week it will keep its "rumor control" website active ahead of the 2022 midterm elections.
All enterprises face potential losses due to insider threats, whether the threat actors are malicious or otherwise. This white paper delves into
All enterprises face potential losses due to insider threats, whether the threat actors are malicious or otherwise. This white paper delves into where insider threats come...
Cyber criminals are getting bolder and more sophisticated with their threats. No matter what kind of business you are in, you are likely to run into ransomware threats. During a ransomware attack, organizations - big and small - struggle to maintain productivity, preserve brand reputation and come up with a payment...
A Nigeria-based ransomware gang is conducting a campaign that dangles a $1 million bribe - or a portion of any ransom collected - to employees of targeted organizations if they will install DemonWare ransomware on their corporate network.
Security leaders face numerous challenges, including software vulnerabilities, third-party supplier liabilities, and distracted employees who may not realize their security behaviors are putting the company at risk. While many organizations focus on mitigating external threats, 30% of data breaches actually involve...