Tag Archive for: importance

The Importance of Cyber Protection in Supply Chain | Technology


, a global leader in , today released its 2020 Acronis Cyberthreats Report, its in-depth review of the current threat landscape and projections for the coming year. Based on the protection and security challenges that were amplified by the shift to remote work during the COVID-19 pandemic, Acronis warns 2021 will bring aggressive cybercrime activity as criminals pivot their attacks from data encryption to data exfiltration.

Ransomware continues to be the leading threat, with Maze ransomware accounting for nearly half of all known cases in 2020. Yet the Acronis Cyberthreats Report points to a growing trend of cybercriminals trying to maximise their financial gain. Not content to collect ransoms to decrypt infected data, they steal proprietary – and sometimes embarrassing – data before encrypting it. They then threaten to publicly release the stolen files if the victim doesn’t pay up.

Acronis reports that more than 1,000 companies had their data leaked following a ransomware attack in 2020 – a trend that is expected to accelerate in the coming year, overtaking encryption as the criminals’ primary tactic.

undefined

“More than any year in recent memory, 2020 posed a tremendous number of challenges to IT professionals, organisations, and the service providers who support them,” noted Stas Protassov, Acronis co-founder and Technology President. “What we’ve seen is how quickly bad actors are adjusting their attacks to the new IT landscape. By analysing the activity, attacks, and trends we’ve detected and clearly presenting our findings, we hope to empower our partners and help the IT community at large prepare for the threats on the horizon.”

undefined

Takeaways of the Acronis Cyberthreats Report

Among the other notable findings in the Acronis Cyberthreats Report include:

  • Attacks against remote workers will increase. While 31% of global companies reported daily cyberattacks in 2020, the frequency of attacks targeting their remote workers is projected to increase in 2021, since the defences for systems outside of the corporate network are more easily compromised, giving bad actors access to that organisation’s data.
  • Ransomware will look for new victims, become more automated.

Source…

The Importance of Security Strategy Can’t Be Overstated


Lots of things about cybersecurity are important, but none is as crucial as one specific parameter: security strategy. Everything flows from this. If this gets short shrift, anything and everything can collapse like a house of cards.

So let’s take a good look at this topic, starting with the likely cost of weak strategy. It opens the door to breaches, and the average cost of a data breach is now approaching $4 million, according to Ponemon Institute’s Cost of a Data Breach Report 2020. Meanwhile, nearly half of US companies have unfortunately suffered a breach, says the 2020 Thales Data Threat Report.

In addition to the cost, such as data loss and regulatory fines, organizations also suffer from tarnished reputations, erosion of customer trust and loss of business. It’s particularly painful for small and midsize companies, which frequently go out of business in the aftermath of a breach.

Cybersecurity isn’t inexpensive. So, predictably, the best cybersecurity strategy for a business depends largely on whether it is small, midsize or huge. So I’ll offer strategy tips for each category. Regardless of company size, however, a few steps across the board are critical from the get-go. One is to develop an understanding of those assets your company absolutely must protect. To accomplish this, a company needs to review its business processes and determine those that could undermine revenue if their data is stolen or suddenly becomes unavailable.

In addition, all companies have to determine their risk appetite—i.e., the risk they are prepared to accept in pursuit of business objectives. Risk appetites differ, depending on the industry in which the company competes, its financial strength and specific objectives being pursued. Last, small and midsize companies in particular need to assess the ability of their organization to get the necessary security work done. If you have IT/security teams, you need to get a handle on their bandwidth. If you don’t have the resources you need, you have to outsource some of your security work.

Once these considerations are addressed, several steps are appropriate for companies of all sizes. For starters, a company needs a cybersecurity…

Source…

Army Cyber lobbies for name change this year, as information warfare grows in importance – ArmyTimes.com

Army Cyber lobbies for name change this year, as information warfare grows in importance  ArmyTimes.com
“cyber warfare news” – read more

T-Mobile data breach shows importance of securing internal tools

  1. T-Mobile data breach shows importance of securing internal tools  TechRepublic
  2. T-Mobile website data breach exposed customer addresses, PINs  WSOC Charlotte
  3. T-Mobile Website Allowed Hackers to Access Your Account Data With Just Your Phone Number  Motherboard
  4. Full coverage

data breach – read more