You searched for breach/ | SC Media

Your search for breach/ returned 8733 results

Your search for breach/ returned 8733 results

Sort Results:

Relevant Recent
Perspectives

Three reasons the ‘moving target defense’ can stop bot attacks

The cybersecurity industry has an effectiveness problem. Despite thousands of available tools, breaches continue unabated. If these tools – which often overstate the effectiveness of artificial intelligence and machine learning – were enough to solve the problem, they would have done so by now.  Headlines often capture stories of large-scale breaches, but leave out pertinent…
Perspectives

How to use psychology to prevent employee mistakes that lead to breaches

We can all admit that 2020 has been a stressful year. But how have these increased levels of stress impacted cybersecurity at businesses across the country?  Recent data from Tessian found that nearly half of employees say they’ve made a mistake at work that has compromised their company’s security. But even more worrisome, 52% of…
Perspectives

Here’s a workable, five-point security plan for navigating the pandemic

Companies will feel the effects of the global pandemic for several years, and many businesses won’t survive the transformation tsunami that’s slowly, but surely coming. Organizations that survive won’t stay the same, and that also applies to their security practices. Security teams have to identify the cybersecurity obstacles the company faces and explain them to…
WebCast

The Pesky Password Problem: Policies That Help You Gain the Upper Hand on the Bad Guys

What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods? For decades, end-users have borne the brunt of the password tyranny, a result of the IT industries’ inability to engineer secure systems. Password complexity, length, and rotation requirements are the bane of your end-user experience and literally the cause of thousands of data breaches. But it doesn't have to be that way!
WebCast

New methods for protecting front-line devices

New methods for protecting front-line devices NOVEMBER 18 & 19, 2020 As front line devices in network security, unprotected endpoints are primary targets for threat actors. Because they’re directly connected to the Internet, malicious hackers can easily leverage search engines like Shodan, which helps them locate any Internet-connected device, to pinpoint which are unprotected. Compounding the problem, far too many security leaders have bolstered their security arsenal with technological bells and whistles that result in endpoint complexity. Endpoint security is all about remediating vulnerabilities in devices, but more importantly, having an incident response plan in place when the inevitable breach occurs.
WebCast

Malware is constantly evolving – Are you?

Though malware has continued to evolve, its delivery mechanism has remained a constant: According to the 2019 Verizon Data Breach Investigations Report, 94 percent of malware was delivered by email. In recent years, the explosion in ransomware attacks has rightly taken center stage when it comes to malware analysis. Evaluating the more than half a million instances reported in 2019, security firm Emsisoft estimates an aggregate ransom demand exposure of more than $6.3 billion.
Perspectives

Nudging your employees towards better cyber hygiene

It’s no coincidence that cybersecurity terminology borrows heavily from medicine: bugs, immunity, infections, and viruses. And, as we all know, based on the advice of washing our hands for the umpteenth time and singing “Happy Birthday” twice, prevention often works better than a cure. In cybersecurity, as in medicine, achieving good outcomes requires as many people…
Next post in Perspectives