Top 8 Common Cybersecurity Weaknesses in Businesses

Your business cannot afford to become a victim of internet criminals. It only takes one threat to compromise a weak security system, and then your business is exposed.
Cyberattacks are common and occur now more than ever. More importantly, they happen quite frequently with small to medium-sized businesses. According to a study, 43% of cyberattacks are directed toward small businesses. Meanwhile, only 14% prepared for hackers.
Cyberattacks don’t just target small businesses, though. Any person can be at risk for identity theft and more. That’s why it’s important to be aware of cybersecurity weaknesses and vulnerabilities.

Read more...

Safeguarding Your Organisation Against Phishing Attacks

With phishing attacks on the rise, the potential cost of a data breach to organisations is worrying. IBM and Ponemon’s research revealed that data breaches cost UK enterprises an average of $3.88 million per breach. While the cost alone is eye wateringly painful, organisations also suffer reputational damage, a loss of trust, and significant disruption to operations.

Read more...

What is Vendor Lock-In and how to avoid it?

The proliferation of digital technologies has impacted how organizations are doing business and interact with customers and vendors. Nowadays, organizations are increasingly utilizing cloud services to facilitate running most of their IT services.
This introduction about cloud computing and its widespread adoption is necessary because vendor lock-in most frequently happens in cloud environments. This article sheds light on the term “vendor lock-in” and discusses best practices to mitigate its negative impact on business operations.
This introduction about cloud computing and its widespread adoption is necessary because vendor lock-in most frequently happens in cloud environments. This article sheds light on the term “vendor lock-in” and discusses best practices to mitigate its negative impact on business operations.

Read more...

Email Security: The Crucial Double Check

Despite innovations and sophistication in hacking methods, one of the main means of data loss is insiders, including employees making mistakes. Humans make errors – stressed, distracted employees will make even more mistakes. And with sensitive information on the line, such as regulatory compliance to safeguarding Intellectual Property (IP), companies are increasingly concerned about the risk of inadvertent data loss. But how can this threat be mitigated? This article emphasises the importance of implementing a crucial double check to improve email security culture.

Read more...

Why You Should Care About Cyber Supply Chain Risk Management

To remain competitive in this new business and complex IT environment, organizations must be fully aware of the threats affecting their supply chains and should work effectively to mitigate them before they pose risks to their customers and business operations. This article sheds light on the term Cyber Supply Chain Risk Management (C-SCRM), outlines the most common threats, and lists mitigations to lower their impact.

Read more...

The Role of Data Governance in Cybersecurity

Data is a critical enterprise asset that underpins operations, drives decision-making, makes personalised end-to-end service delivery possible, unlocks competitive advantage and more. Unfortunately, all this data represents a rich prize for cyber criminals looking to steal, hijack, or hold data to ransom. Which is why cybersecurity has become a top strategic priority for today’s organisations, given the exponential rise of ransomware, phishing and other cyber threats.

Read more...

What exactly is Security Assurance?

If you are a regular reader of Cybersecurity Magazine, you may have come across Security Assurance before. In this article, we take a look at what is behind this abstract term and why it is so important.
Security assurance is an umbrella term for several processes aimed at ensuring individual system components can adequately protect themselves from attacks. Doing so requires not just a one-time effort, but actually spans the complete system lifecycle. After all, what is considered an acceptable security posture may change over time depending on, for example, newly emerging threats or changes to how the system itself is utilized.

Read more...

Why should banks be concerned with DDoS attacks?

Distributed Denial of Service (DDoS) attacks first appeared on the radars of security experts around 1999, when a wave of cyberattacks brought down countless websites, including resources of major corporations, such as CNN, eBay, Amazon, and E-Trade.
Many years later, DDoS attacks have not lost their relevance, on the contrary, DDoS attacks are growing more and more destructive. Financial institutions are increasingly becoming the targets of malicious actors, their financial and commercial losses inflicted by DDoS, lost revenue, customer churn, and hits to reputation, far exceeding operating losses.
DDoS then is a real and pressing threat for banks. But why are DDoS attacks in this industry that much more prevalent?

Read more...

Drill Down into the EU Toolbox for 5G Security

5G networks are becoming a key part of our critical infrastructure, enabling wireless networking in a broad range of scenarios from mobile broadband to massive IoT. Until recently though there has only been moderate noticeable output by national regulators on the specific security risks 5G systems are subject to.
Cybersecurity Magazine takes a look at the efforts made by the EU and its “Toolbox” to better realize guidance beyond industry standards and ensure a common security baseline at scale.

Read more...