Global Cyber Attacks to Double from 2020 to 2024, Report Finds

Global Cyber Attacks to Double from 2020 to 2024, Report Finds

On the first day of Cybersecurity Awareness Month in the U.S., research has revealed that the number of significant global cyber attacks in 2024 will be double that of 2020. A new report from insurer QBE, Connected Business: digital dependency fuelling risk, predicts that organisations will be hit by 211 disruptive and destructive cyber attacks this year. Disruptive incidents are reversible and only impact data availability, integrity, or access — such as distributed denial-of-service attacks….

Read More

Security Chiefs Take On IT Roles as More Infrastructure Moves Online

Security Chiefs Take On IT Roles as More Infrastructure Moves Online

Stay-at-home orders during the Covid-19 pandemic spurred new cloud computing and remote-technology setups, increasing company exposure to hackers. As a result, some corporate cybersecurity chiefs are also taking on the leadership role for all of information technology. Oversight of both groups isn’t an easy line to walk.  Having spent years in general IT, these chief information security officers understand the cyber risks of an increasingly far-flung tech infrastructure, said Lucia Milică Stacy, global resident CISO…

Read More

Cyber risk is a business risk

Cyber risk is a business risk

Cyber risk is a business risk | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Security executive job search myths and realities

Security executive job search myths and realities

Security executive job search myths and realities | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Make Change Your Password Day an impetus to boost overall cybersecurity

Make Change Your Password Day an impetus to boost overall cybersecurity

Make Change Your Password Day an impetus to boost overall cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Better security in business districts requires communication & funding

Better security in business districts requires communication & funding

Better security in business districts requires communication & funding | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Shadow IT risk: A dangerous connection

Shadow IT risk: A dangerous connection

Shadow IT risk: A dangerous connection | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

A chilling Russian cyber aim in Ukraine: Digital dossiers

A chilling Russian cyber aim in Ukraine: Digital dossiers

BOSTON (AP) — Russia’s relentless digital assaults on Ukraine may have caused less damage than many anticipated. But most of its hacking is focused on a different goal that gets less attention but has chilling potential consequences: data collection. Ukrainian agencies breached on the eve of the Feb. 24 invasion include the Ministry of Internal Affairs, which oversees the police, national guard and border patrol. A month earlier, a national database of automobile insurance policies…

Read More

Ransomware Threats Are Everywhere. Here’s How to Fight Back.

Ransomware Threats Are Everywhere. Here’s How to Fight Back.

The cyber criminals are winning. After the recent spate of devastating attacks, experts say it’s only going to get worse from here, with hacking tools becoming increasingly available and high ransomware payments enticing more malicious actors and daring them to go after ever bigger targets. Corporations and governments need to act quickly and take concrete steps to counter the rising threat. The flurry of cyberattacks on critical infrastructure and government computer systems has been unprecedented. Late last year, victims…

Read More

Security chiefs report cyberattacks on business up since remote work enabled

Security chiefs report cyberattacks on business up since remote work enabled

TORONTO – A new report estimates nearly two-thirds of businesses globally, including 63 per cent in Canada, have seen an increase in targeted cyberattacks since they switched to widespread remote work. The report from U.S. -based Proofpoint is based on a first-quarter survey of 1,400 chief information security officers at mid-sized and large businesses in 14 countries, including Canada. More than half (51 per cent) the Canadian information security officers said that human error is…

Read More