Top 8 tips for implementing MFA effectively

Top 8 tips for implementing MFA effectively

Cyber threats are becoming more frequent and sophisticated. Protecting our digital assets isn’t just a priority — it’s a necessity. And, while we are observing Cybersecurity Awareness Month, the Cybersecurity and Infrastructure Security Agency (CISA) noted companies need to “turn on multifactor authentication (MFA).” However, there needs to be a more calculated approach to doing so. MFA is a powerful tool in our cybersecurity arsenal that adds extra layers of security beyond just passwords. But,…

Read More

47% of Organizations Have Dealt With Deepfake Attacks

47% of Organizations Have Dealt With Deepfake Attacks

According to a recent iProov report, the risk of deepfakes is rising with almost half of organizations (47%) having encountered a deepfake and three-quarters of them (70%) believing deepfake attacks which are created using generative AI tools, will have a high impact on their organizations. Sixty-eight percent believe that while it’s impactful at creating cybersecurity threats, more (84%) find it’s instrumental in protecting against them.  While organizations recognize the increased efficiencies that AI can bring,…

Read More

Where do CISOs stand in an era cyberattacks and intense scrutiny?

Where do CISOs stand in an era cyberattacks and intense scrutiny?

Cybersecurity has no doubt entered the national dialogue when it comes to economic or even national security issues. By nature, cyber is a deeply technical endeavor, but organizational culture surrounding security has become as important as the tech wizardry itself. This is evidenced by Microsoft’s recent testimony before the House Homeland Security Committee around alleged security lapses (for instance, the tech giant was mired in the headline-grabbing SolarWinds breach that touched government agencies). It has…

Read More

The value of security: building the foundation for modern enterprises

The value of security: building the foundation for modern enterprises

Physical security isn’t an afterthought for organizations: it is critical infrastructure. Retailers, healthcare providers, municipalities, schools and all kinds of other organizations rely on security systems to keep their people and places safe.  As the capabilities of security technology have evolved, many organizations are taking a broader view of their investments and understanding how they can deliver more value across their operations. From opportunities to modernize the workplace with tools like touchless door access to…

Read More

Liars in the wires: Getting the most from GenAI without getting duped

Liars in the wires: Getting the most from GenAI without getting duped

Before, artificial intelligence (AI) and machine learning (ML) required programming languages. Now, simple text interfaces enable everyone to interact with powerful models that are seemingly limitless. A University of California, San Diego study found that GPT4 has passed the TuringTest, with 54% of participants mistaking GPT4s responses as coming from a human. Many of the latest AI enabled tools can make you feel like you’ve mastered new subjects far and wide, unlocking vast riches and…

Read More

Only 5% of business leaders report seamless connectivity

Only 5% of business leaders report seamless connectivity

A survey of 500 enterprise leaders across six countries (United States, United Kingdom, Germany, Japan, Canada and Australia) highlights the relationship between connectivity and cybersecurity. The research asserts that better connectivity improves an organization’s chances of defending against cyberattacks, as 38% of organizations with excellent connectivity are among industry leaders for cybersecurity performance. When an organization has good connectivity, only 22% are considered industry leaders.  However, only 5% of business leaders report seamless connectivity across…

Read More

Only 25% of organizations are prepared to manage a DDoS attack

Only 25% of organizations are prepared to manage a DDoS attack

OPSWAT and Dark Survey collaborated on a survey revealing IT and corporate leadership concerns about organizational preparedness. Survey responses indicate a lack of preparedness for evolving cybersecurity threats, as only 25% of respondents feel their organization is fully equipped to manage DDoS attacks. For threats such as botnets, Advanced Persistent Threats (APTs), API security issues and zero-day malware, the expressed preparedness level is even lower.  Many respondents report experiencing attacks as well. These include:  24%…

Read More

Why insider attacks are indicative of a need for security convergence

Why insider attacks are indicative of a need for security convergence

What is security convergence? Security convergence is the merging of the two previously distinct practices of physical and cyber security to create a more cohesive and effective security defense against all types of crime. Only 20% of all businesses have fully converged physical and cyber security measures together. This is despite a rapidly growing rate of breaches within businesses, including insider attacks. Many are relying purely on one or the other without considering how they…

Read More

Balancing trust and safety: Lessons from the CrowdStrike incident

Balancing trust and safety: Lessons from the CrowdStrike incident

On July 19, CrowdStrike, one of the largest endpoint security providers, issued an update to Windows servers globally that caused them to enter a “crash loop,” resulting in the infamous Blue Screen of Death (BSOD). CrowdStrike explained the issue was caused by a “defect found in a single content update for Windows hosts.” The downstream impact of this bug resulted in one of the largest and broadest outages in history. When situations like this occur,…

Read More

The bad actor’s best friend: Dormant service accounts

The bad actor’s best friend: Dormant service accounts

Dormant accounts, also known as inactive accounts, are accounts that haven’t been used or updated in at least 90 days. This extended period of inactivity gives them their “dormant” classification.  Since these accounts are not being actively used, it’s common for application owners not to know they exist. The lack of knowledge can be attributed to the fact that these accounts aren’t being accessed or updated, meaning they don’t appear in system logs or trigger…

Read More
1 2