If your business stores digital assets in the cloud, it could be vulnerable to attack. According to the 2021 Verizon Data Breach Investigations Report (DBIR), in 2020, 73% of all cyberattacks targeted cloud assets. That statistic is punctuated in a separate study by Oracle and KPMG, which found that three-quarters of organizations have experienced data loss from a cloud service more than once.
For this reason, it’s imperative that you audit your organization’s cloud security posture. But when...
Supply chain breaches are surprisingly commonplace. A study by Opinion Matters found that 92% of U.S. organizations have experienced a breach that originated with a vendor.
But when you’re dealing with dozens if not hundreds of third parties – some who handle sensitive data – third-party cyber risk management can quickly become overwhelming.
Let’s look at four ways you can effectively expose and rectify cyber risk in your organization’s supply chain.
No organization is immune from ransomware, but there are best practices you can follow to minimize the risk to your organization. While there are tools to help combat ransomware, it’s also critical to maintain a relentless focus on security hygiene. This means regularly applying software patches and proper configuration management protocols since both contribute to a heightened risk of ransomware. It also requires maintaining a continuous view of your vendors’ security postures to reduce the risk of supply chain ransomware attacks.
It’s a question more people are asking with each passing day:
How do I know if I am at risk for a ransomware attack?
Unfortunately, the fact that so many are posing this question reveals how unprepared many organizations are in the face of rising ransomware challenges. Ransomware attacks are getting bigger and bolder. There are those that are well known, like the Colonial Pipeline attack, and those that get less attention but are no less insidious, like the LockBit ransomware threat that hobbled Accenture. In each case, organizations likely thought they were well prepared for potential cyber
Credit unions must be on high alert for cyberattacks. That’s according to a recent warning issued by the National Credit Union Administration (NCUA), who cautioned the industry of potential avenues of attack, including ransomware and supply chain attacks.
Such attacks pose grave threats to the nation’s financial organizations. Sensitive financial information can be breached, operations brought to a halt, and a credit union’s reputation tarnished. It’s no surprise then that the NCUA has encouraged eligible low-income credit unions to apply for up to $7,000 in funding to strengthen their cyber
Imagine you've alerted your IT team to a critical infrastructure error plaguing your network. You ask them to drop their current work and focus on immediate remediation of this detected vulnerability. After further investigation, however, it is found to be a false positive. Unfortunately, these incidents are commonplace – and they cost your organization valuable time and manpower. More worrying, they distract from legitimate security issues. Clearly, this frustrating and critical issue must be addressed. Let’s look at some ways you can narrow your team’s focus so they can identify
With cyberattacks on the rise, security investments are more important than ever. Still, the pandemic has forced many organizations to reconsider how they allocate their IT dollars. Between the new work-from-home paradigm and the increasingly global nature of many modern workplaces, CIOs have had to accelerate investments in cloud solutions and remote technology.
But as a security leader, you need to find ways to secure your share of these dollars so that you can support this new normal and protect your organization’s rapidly expanding digital ecosystem.
To be successful, you must demonstrat
From sensors on the factory floor to those that guide autonomous vehicles, the Internet of Things (IoT) is transforming how we live and work. Over the coming years, IoT will continue to change our world, with the number of connected devices expected to grow from 13.8 billion units in 2021 to 30.9 billion by 2025.
But for security teams, it can seem like the Wild West out there. As more and more IoT devices connect to the corporate network, understanding and mitigating the risk they pose is an arduous task. It’s no surprise that attacks against IoT devices are rising at an alarming rate.
Whether you are anxious to grow enrollment, improve student experience, or increase your share of the online education market – if technology delivery is particularly slow – your institution probably has a tech debt problem.
Technical debt is a crippling burden that severely limits higher education institutions from making faster, more meaningful progress with their IT investments. If you’re a higher education CFO or executive, and hope to provide better, higher quality digital experiences fo...
Amazon is on the brink of a possible breakup, and marketers should be ready to seize the opportunity.
It's difficult to imagine life without Amazon -- as we know it. An astonishing 63 percent of consumers start their online shopping search on Amazon and the online retailer is expected to seize 50 percent of the entire e-commerce market during 2021.
But with a new administration in the White House and ongoing antitrust probes by Congress, there's a real possibility that Amazon's e-commerce dominance may soon end.
Let's examine what a breakup of Amazon could look like -- and why it's likely a
1. Understand and monitor your organization's attack surface
One of the reasons why threat actors are so successful is that they can exploit risk hidden in complex and expanding digital ecosystems.
Today’s organizations have hundreds of thousands of digital assets located on-premises, in the cloud, across geographies, business units, and subsidiaries – making it hard to pinpoint where risk may exist. It may be a misconfigured firewall (like the one that resulted in the massive Capital One dat...
Understand your IoT attack surface
The first step to securing internet-connected devices is getting a handle on the IoT devices in your digital ecosystem. That goes for the smart refrigerator in the breakroom to the IoT technology your organization uses to track assets. After all, you can’t secure what you can’t see.
One way to gain visibility into your IoT network is to take stock of each connected device deployed across your business. This isn’t always easy, especially if your organization ...
When I founded Macro Solutions more than 20 years ago, information technology (IT) was a male-dominated domain. The opportunities for women were few and far between. Today, things have changed. Still, there’s a long way to go toward equity and diversity in the workplace – especially in leadership positions.
While women make up almost half of the U.S. workforce, that number is much lower in the tech sector. Studies show that the percentage of women who pursue tech careers has dropped from 35% ...
When the pandemic closed schools across the country, K–12 districts undertook the herculean task of moving millions of students and staff to remote learning as quickly as possible. This allowed educators to continue providing learning to students, but the rapid shift wasn’t without difficulties. Among the many setbacks stemming from this upheaval, 57 percent of educators now estimate that students are behind in their social-emotional development by more than three months.
However, there is some good news. After more than a year of closings, the government has allocated pandemic recovery gran
Online marketing is constantly evolving, and it can be hard for B2B marketers to keep up. But this is no time for laggards. With more people working from home, boosting your online presence is critical. Just look at webinars, 39% more people attended online events in 2020 than in prior years. And the B2B business outlook for 2021 and 2022 suggests that marketers will continue to accelerate digital growth with search, virtual events, podcasts, and LinkedIn replacing traditional marketing tacti...