recentpopularlog in

jonerp : cyber   8

Cyber warfare may be imminent, but defender power is on the rise
"Outside of geopolitical conflict and terrorism, our research has found that malware continues to be a major threat. In fact, it was the most prolific type of cyberattack UK businesses experienced in 2019. Our latest UK Threat Report was published in October 2019. One in five businesses (21%) reported seeing custom malware attacks most frequently and 10% cited commodity malware. It means that 31% of businesses reported malware to be the most witnessed attack type."
blogs  cni  cyber  strikes  financial  services  iran  malware  ransomware  terrorism  us 
4 weeks ago by jonerp
To Change or Not to Change: The Decision to Stay on the Green Screen
"Let’s consider a few reasons why you may not want to replace your legacy system, just yet:

They simply don’t break: Like your Grandad’s 1992 Honda or Swiss watch, the thing will pretty much run forever. The technology behind the old IBM mainframes is simple and sturdy, and as long as it is cleaned and maintained it will work. Cloud ERP systems, on the other hand, are only as reliable as your users’ internet connections.
Your business has not changed: We find many scenarios where companies have been doing the same thing for 30 years, and with good reason. Consider a company that manufactures a niche supply part for an industrial manufacturing segment. It may be specialized enough that the barriers and cost of entry is too great for competitors to chase and they have consistent clientele. With no desire to expand, there may be no reason to change what’s working."
digital  strategy  erp  software  selection  cloud  cyber  security  cybersecurity  failures  independent  consultants  top  10  systems  for  2020 
7 weeks ago by jonerp
Why Businesses Should Start Prioritising Cybersecurity
"Ransomware attacks on such a massive scale seem to happen at least once a month nowadays. The entire American city of Baltimore was “held hostage” in May. A similar incident happened in Greenville, North Carolina the previous month.

Massive attacks aside, cybercriminals tend to target small businesses due to fewer investments in their cybersecurity infrastructure. It’s predicted that a new organization will be affected by such an attack every 11 seconds as soon as 2021."
"blogs  breaches  cyber  security  cybersecurity  hacking  proprivacy  ransomware  smb  sme  vpn  wi-fi  wpa2 
9 weeks ago by jonerp
5 Ways To Demystify Zero Trust Security
"To Chase Cunningham’s point, more customer use cases need to be created, and thankfully that’s on his research agenda. Starting the conversation with each vendor visited by asking for their definition of Zero Trust either led to a debate of whether Zero Trust was needed in the industry or how their existing architecture could morph to fit the framework. Booth staffs at the following companies deserve to be commended for how much they know about their customers’ success with Zero Trust: Akamai, Centrify, Cisco, Microsoft, MobileIron, Palo Alto Networks, Symantec, and Trend Micro."
business  featured  posts  technology  software  trends  &  concepts  akamai  capgemini  centrify  cisco  ledios  cyber  louis  columbus'  blog  microsoft 
march 2019 by jonerp
Microsoft warns of new tech support scam approach
"The new email campaigns use reputable brands to trick users. Microsoft has published some of the emails it has captured. These appear to come from big brands such as Alibaba, Amazon and LinkedIn. They all contain links that if examined are not to the sites they claim to be from. The reason these emails succeed is that people often take the email at face value, trust the brand and just click on the link without thinking about it."
homepage  slider  latest  news  security  cyber  email  linkedin  malware  microsoft  exchange  office  365  outlook  scammers 
august 2017 by jonerp
Cisco warns of DeOS attacks
"The use of the Internet of Things (IoT) by hackers has been well documented. A significant part of the problem is the lack of security in too many Internet connected devices. Enterprise IT departments often have no say in the purchase of many of these devices. Security cameras, fridges, televisions and other goods are often purchased by different departments. Few of them have any security training."
homepage  slider  latest  news  security  cisco  cyber  ddos  deos  iot  not  petya  nyetya  ransomware 
july 2017 by jonerp
UK government vows to sink $2.3 billion into new cybersecurity plan
"The UK government has promised to spend nearly £2 billion over the next five years to try to tackle the growing problem of cyber attacks in the country."
ministry  of  innovation  risk  assessment  cyber  security  strategy  cyberattacks  gchq  philip  hammond  talktalk  treasury 
november 2016 by jonerp
Fear and loathing at RSA — Hacking, security and the limits of protection - by @ron_miller
"It’s easy to forget that none of this tends to happen in isolation, yet companies tend to feel isolated. Instead of banding together against a common enemy, they instead try to fight alone. In many ways it doesn’t make sense to take this approach, but companies which don’t want to be seen as having weak security in the eyes of the public, likely don’t understand that on some level everyone is equally vulnerable."
enterprise  security  tc  rsa  hacking  cyber 
march 2016 by jonerp

Copy this bookmark:





to read