Home Blog Page 96
For those of you who are involved in the Healthcare Industry must be well aware of the Health Insurance Portability and Accountability Act (HIPAA) Compliance. The regulation is a standard framework and statement of best practices for healthcare industries...
Hiring a chief information security officer (CISO) may not be in the budget for small or midsize organizations as their total cash compensation can range between $208K to $337K. However, at the same time, these organizations recognize the growing importance of...
The digital era is awash with potential threats including malware, spyware, ransomware, and denial of service attacks that threaten the security of workplaces everywhere. To ensure security, organizations use multiple protocols including encryption, authentication, and firewalls to safeguard crucial...
Ransomware operators and their ransomware attacks are becoming more rampant and successful than ever. Ransomware groups are always leveraging a combination of factors to easily obtain access to corporate networks and demand high ransom. With the rise of ransomware-as-a-service, cybercriminals...
Cybercriminals have been putting an added strain on the financial sector for the past few years. A report in November 2020, showed that 65% of the financial services firms suffered a cyberattack last year. However, the majority of these...
Cybersecurity experts discovered hundreds of fleeceware mobile applications on the Apple Store and Google Play Store tricking thousands of unwitting users into paying unnecessary subscription fees. Security researchers from Avast found over 204 fleeceware apps with nearly a billion downloads....
What is your mean time to remediate (MTTR). Unless you’re measuring it in minutes, it’s too long. Is automated remediation the answer? We understand being cautious about a new “process.” But what if you knew, before diving in, where...
Imagine one morning you wake up and check your mobile phone for emails and messages and you notice that there is no new data on it. Anxious, you rub your eyes and take a closer look. But you cannot...
As the world celebrated womanhood and women’s contribution to society on International Women’s Day, we at CISO MAG decided to devote the month of March to all the women in cybersecurity. The purpose of this article is to highlight...
Ransomware attacks were the most observed security threats among various cybercriminal activities in 2020. Cybercriminals target victims by encrypting their sensitive files, with an end goal to disrupt organizations’ operations and demand ransom or threaten victims by exposing the...