Tag Archive for: practices

ThoughtLab reveals 10 best practices for cybersecurity in 2022


ThoughtLab, the global research firm, has announced the findings of its 2022 cybersecurity benchmarking study, Cybersecurity Solutions for a Riskier World.

The study analysed the cybersecurity strategies and results of 1,200 large organisations across 14 different sectors and 16 countries, representing $125.2 billion of annual cybersecurity spending.

The research revealed that the pandemic has brought cybersecurity to a critical inflection point. The number of material breaches respondents suffered rose 20.5% from 2020 to 2021, and cybersecurity budgets as a percentage of firms’ total revenue jumped 51%, from 0.53% to 0.80%.

During that time, cybersecurity became a strategic business imperative, requiring CEOs and their management teams to work together to meet the higher expectations of regulators, shareholders and the board.

In addition, the role of the chief information security officer (CISO) expanded, with many taking on responsibility for data security (49%), customer and insider fraud (44%), supply chain management (34%), enterprise and geopolitical risk management (30%), and digital transformation and business strategy (29%).

Yet 29% of CEOs and CISOs and 40% of chief security officers admit their organisations are unprepared for a rapidly changing threat landscape.

The reasons cited include the complexity of supply chains (44%), the fast pace of digital innovation (41%), inadequate cybersecurity budgets and lack of executive support (both 28%), convergence of digital and physical assets (25%), and shortage of talent (24%).

The highest percentages of unprepared organisations were in critical infrastructure industries: healthcare (35%), the public sector (34%), telecoms (31%), and aerospace and defence (31%).

Over the next two years, security executives expect an increase in attacks from social engineering and ransomware as nation-states and cybercriminals become more prolific, according to the report.

Executives anticipate that these attacks will target weak spots primarily caused by software misconfigurations (49%), human error (40%), poor maintenance (40%) and unknown assets (30%).

As part of ThoughtLab’s evidence-based research, its economists…

Source…

Best Practices for Ransomware Defense and Recovery Summit — Virtualization Review


Best Practices for Ransomware Defense and Recovery Summit

Date: Friday, October 14th at 9 a.m. PT / 12 noon ET

Ransomware attacks are the new reality for every organization. You will be hit, it can easily bring organization to its knees and, without a quick and reliable recovery process, the damages can be irreparable. As an IT professional responsible for your enterprise’s security you have to know the threats, know how to deal with them and know that your recovery plan is solid (and have it tested in live environments!)

Find out the best way to get your defense plan in place from independent experts who’ve done it before with this free half-day summit brought to you by the editors of Virtualization & Cloud Review and Redmondmag.com. Don’t miss it!

Here is the AGENDA for the summit:

9 a.m. PT / 12 noon ET
Current Ransomware Threats & What You May Not Know

10 a.m. PT / 1 p.m. ET
Real-World Best Practices for Ransomware Defense & Recovery

11 a.m. PT / 2 p.m. ET
Hottest Third-Party Solutions

Register now!

Date: 10/14/2022

Time: 9:00am PT

Duration: 3 hours


Source…

Common IoT Security Threats and best practices to counter them



Read Article


By Bhavesh Goswami, CEO & Founder, CloudThat

The Internet of Things (IoT) is a growing phenomenon that is being adopted by various businesses to increase efficiency. As objects around us are increasingly being connected to the internet, IoT devices are ubiquitous today. Moreover, the IoT market is growing at a staggering rate with each passing day. This piece of statistics from IoT analytics emphasizes the growing pace of the IoT market. In 2021 the number of IoT devices worldwide was 13.8 billion, in 2022 it is expected to grow up to 16.8 billion devices and by 2025 it is estimated to become 30.9 billion devices. Interestingly, the report also says that by 2030, 75% of devices used worldwide will be IoT devices.

While IoT devices can greatly influence and increase productivity in business, it is also very important to understand that these devices are exposed to threats such as unethical hacking or masquerading from any of the internet-enabled devices. Moreover, the security vulnerabilities of IoT devices must be effectively handled and it is here where IoT security steps in.

IoT security: Knowing the Basics First
IoT security is a pool of tools and techniques employed to thwart security vulnerabilities faced by millions of inter-connected devices on the Internet. In other words, IoT security involves protecting IoT devices from attacks. While many business owners are aware that they must safeguard their PCs and phones with antivirus software, the security concerns associated with IoT devices are less widely understood, and their protection is sometimes overlooked. So, understanding the security vulnerabilities and threats is critical for adequately protecting one’s network.

6 Common IoT Security Threats: Cause of Concern for Businesses

•Weak password protection- IT systems and IoT devices consist of hard-coded and embedded credentials which are an unexpected gain for hackers to attack the device directly. Taking control of an IoT device via its interface or web portal is simple with a weak password.

•Lack of regular patches and weak update mechanism– IoT products are designed to keep usability and connectivity in mind. Initially, they may be…

Source…

Orca Security Launches Industry's First Cloud Risk Encyclopedia to Provide Ongoing Education for Cloud Security Best Practices – Galveston County Daily News



Orca Security Launches Industry’s First Cloud Risk Encyclopedia to Provide Ongoing Education for Cloud Security Best Practices  Galveston County Daily News

Source…