According to a new study, 2019 has been yet another brutal year for healthcare cybersecurity. In 2019, so far, nearly four out of five breaches in the industry struck health care providers. And 53% of those attacks were at the hands of external attackers, respondents to a new survey said.
All about Virtualization and Cloud Security | Recent Articles:
Prevent alert fatigue with actionable threat intelligence
2019 is on track to set a record for the highest number of security incidents ever recorded, with 5,183 data breaches and 7.9 billion records exposed by November in the United States alone, according to a report from Risk Based Security.
Imagine a world in which you could simply click onto a website to buy drugs, weapons, fake IDs, malicious software and ‘how to’ guides for building AK47s. In just a button press, you could own just about any illegal item you can think of. In the realm of the dark markets, this world, or underworld, is very much a reality.
The lack of certified cybersecurity professionals is felt throughout the world, and the industry would need to more than double the number of staff to meet the market’s needs, according to a study by (ISC)². As it stands, the supply of qualified labor only meets around 40% of demand.
CISOs, CSOs, and CIOs are not the only C-level executives with a deep concern about cyber security. New research shows that CFOs appear to be taking a more active role in ensuring that their organizations are protected against data breaches, hacks, malware, and other threats.
PayPal has now overtaken Microsoft to become the favorite target of phishing campaigns, according to a third-quarter 2019 report by email security firm Vade Secure.
The number of phishing campaigns has been expanding steadily in recent years as cybercriminals target both private individuals and corporations with social engineering scams, according to the Anti-Phishing Working Group (APWG).
WannaCry is still fresh in our memory, reminding organizations of how distractive an unpatched vulnerability can be especially if weaponized as a wormable threat that delivers ransomware. BlueKeep has been estimated to have the same disruptive potential as EternalBlue (the exploit responsible for WannaCry) if sporting worm-like behavior, especially since RDP is a commonly used service in organizations, allowing IT and security teams to remotely dial into machines.
- Virtual data center security must be agile and mapped in real-time to virtual infrastructure management tools
- Offloading of anti-malware scanning improves user experience, reduces redundant scans, and provides high availability
- Born-secure VM instantiation ensures compliance, improves virtualization density, and minimizes application latency
Here’s a disturbing bit of information: a large number of IT security leaders and teams don’t know if cyber security tools are working as they should, despite organizations investing millions of dollars in such technology each year.
Cybersecurity trends are always evolving. And the Security Industry Association, a trade group that focuses on physical and cyber security, believes it has identified the security “megatrends” that will dominate the immediate and long-term changes within the international security industry.
Companies that are transparent about their cybersecurity risk management efforts are more attractive to investors, after or before a data breach happens in their industry.
The biggest worry for companies should be employee negligence, which remains the primary factor in data breaches, the Bitdefender Hacked Off! survey revealed.
During the 1964 Free Speech Movement at the University of California, Berkeley, activist Jack Weinberg said: “Don’t trust anyone over 30.” Well, when it comes to cybersecurity, it may be more accurate to say Don’t trust anyone under 30.