Geek-Guy.com

Author: Jennifer Gregory

What Experts Had To Say About the 2022 Cost of a Data Breach Report

The 2022 Cost of a Data Breach report was eagerly anticipated by cybersecurity professionals and the technology industry as a whole. Following two years of increased remote work and other changes due to the pandemic, the report was an important benchmark on the lasting impact and future trends of data breaches.  Not surprisingly, this year’s […]

The post What Experts Had To Say About the 2022 Cost of a Data Breach Report appeared first on Security Intelligence.

Why Do Ransomware Gangs Keep Coming Back From the Dead?

Ransomware gangs are major players in the cybersecurity space, especially in recent years. ZDNet reported that ransomware gangs increased their payments by over 311% from 2019 to 2020, with totals for all groups exceeding $350 million in 2020. Ransoms continued rising in 2021. Unit 42, a threat research team at Palo Alto Networks, found that […]

The post Why Do Ransomware Gangs Keep Coming Back From the Dead? appeared first on Security Intelligence.

Cost of a Data Breach: Infrastructure

During the pandemic, businesses and consumers saw firsthand what happens when infrastructure fails. In 2019, the global critical infrastructure protection (CIP) market size was valued at $96.30 billion. It is predicted to grow to $154.59 billion by 2027, with a CAGR of 6.2%. On top of that, each time an organization in a critical sector […]

The post Cost of a Data Breach: Infrastructure appeared first on Security Intelligence.

Does Follina Mean It’s Time to Abandon Microsoft Office?

As a freelance writer, I spend most of my day working in Microsoft Word. Then, I send drafts to clients and companies across the globe. So, news of the newly discovered Microsoft Office vulnerability made me concerned about the possibility of accidentally spreading malware to my clients. I take extra precautions to ensure that I’m […]

The post Does Follina Mean It’s Time to Abandon Microsoft Office? appeared first on Security Intelligence.

How IBM Secured the 2022 US Open

Throughout the US Open Tennis Championship, the infrastructure for USOpen.org and the mobile apps can see upwards of 3 million security events. While the vast majority of events are not serious, security analysts must quickly determine which are concerning to take immediate action. However, with such a large volume and variety of data, security analysts […]

The post How IBM Secured the 2022 US Open appeared first on Security Intelligence.

Companies Without Zero Trust Could Lose $1M More During a Data Breach

In recent years, the mindset for cybersecurity has shifted. It isn’t a matter of if a company has a breach, but rather when a company has a breach. With the increase in cybersecurity incidents, most if not all companies will be victims of a data breach at some point. However, the latest research shows that organizations […]

The post Companies Without Zero Trust Could Lose $1M More During a Data Breach appeared first on Security Intelligence.

Survey Connects Cybersecurity Skills Gap to Increase in Breaches

The skills gap in cybersecurity isn’t a new concern. But, new research revealed in Fortinet’s 2022 Cybersecurity Skills Gap report confirmed what many experts have assumed. The skills gap increased risk and was likely the direct cause of at least some breaches. Data for the survey was collected from 1,223 IT decision-makers in countries across […]

The post Survey Connects Cybersecurity Skills Gap to Increase in Breaches appeared first on Security Intelligence.

How and Why Do Teens Become Cyber Criminals?

The search to find the mastermind of the attacker group Lapsus$ led to a home outside Oxford, England. The suspected leader was a 16-year-old. He helped take down some of the world’s biggest companies, including Microsoft, from his mother’s house. The BBC reported the teen is alleged to have earned $14 million from his attacks. […]

The post How and Why Do Teens Become Cyber Criminals? appeared first on Security Intelligence.

How to Prepare for and Respond to a Data Privacy Breach

Before I started covering cybersecurity, I thought the term ‘breach’ had a single meaning — that an attacker stole data from a computer system. I also thought all the different versions of the word meant the same thing. However, I’ve since learned the nuances and differences between a breach, a data breach and a data […]

The post How to Prepare for and Respond to a Data Privacy Breach appeared first on Security Intelligence.

Cybersecurity Needs to Work Even When Employees Aren’t on Board

Goldman Sachs leadership didn’t get the response they expected from their return to the office (RTO) order. In fact, Fortune reported that only about half of the company’s employees showed up. With today’s tight labor market and many employers allowing remote work, employees have firm ground to stand on. How do you secure a workforce […]

The post Cybersecurity Needs to Work Even When Employees Aren’t on Board appeared first on Security Intelligence.

20 Years Ago in Cybersecurity: Massive DDoS Attack Hits the Roots of the Internet

It was considered the “largest ever” internet attack in 2002. This distributed denial of service attack hit seven of the 13 servers at the top of the internet’s domain name system hierarchy. Now, 20 years later, its origins remain mysterious, but its methods and size still make it stand out. It isn’t the largest by […]

The post 20 Years Ago in Cybersecurity: Massive DDoS Attack Hits the Roots of the Internet appeared first on Security Intelligence.

5 Ways to Retain More Cybersecurity Professionals at Your Organization

Companies that have low retention rates are likely to increase their risk of a cybersecurity attack. The recent ISACA’s State of the Cybersecurity Workforce study found that 69% of respondents whose companies faced more attacks in the past year report being somewhat or very understaffed. However, retention is becoming a bigger challenge. The report also […]

The post 5 Ways to Retain More Cybersecurity Professionals at Your Organization appeared first on Security Intelligence.

One Size Does Not Fit All Organizations

Often, when you read about cybersecurity, the advice appears to be ‘one size fits all’. People recommend the same things, regardless of if the business is two people in a home office or a global group with 100,000 employees. In some ways, the underlying concepts of cybersecurity are the same for all companies. However, the […]

The post One Size Does Not Fit All Organizations appeared first on Security Intelligence.

How to Respond to Non-Malicious Data Breaches

It’s easy to assume most, if not all, data breaches are malicious. Surely, attackers strike on purpose. However, almost two-thirds of data breaches start from mistakes, not an intent to cause harm. According to the Cost of Insider Threats Report from Ponemon, negligent employees create around 62% of security incidents, costing an average of $307,111 […]

The post How to Respond to Non-Malicious Data Breaches appeared first on Security Intelligence.

62% of Surveyed Organizations Hit By Supply Chain Attacks in 2021

You’ve heard more about the supply chain in the past two years than you ever expected, or likely wanted. But, as a cybersecurity professional, you now have even more reason to pay attention besides not being able to get your favorite products at the grocery store. The apps used to develop software and run the […]

The post 62% of Surveyed Organizations Hit By Supply Chain Attacks in 2021 appeared first on Security Intelligence.

SEC Proposes New Cybersecurity Rules for Financial Services

Proposed new policies from the Securities and Exchange Commission (SEC) could spell changes for how financial services firms handle cybersecurity. On Feb. 9, the SEC voted to propose cybersecurity risk management policies for registered investment advisers, registered investment companies and business development companies (funds). Next, the proposal will go through a public comment period until […]

The post SEC Proposes New Cybersecurity Rules for Financial Services appeared first on Security Intelligence.

Technologies Useful In the Pandemic Are Challenging Privacy Now

Your company likely made many quick decisions back in March 2020. As an IT leader, you provided the tools employees needed to stay productive while working remotely. It had to happen now or sooner. Your team made it possible for the business to continue moving forward during the pandemic. It was not easy. But you […]

The post Technologies Useful In the Pandemic Are Challenging Privacy Now appeared first on Security Intelligence.

What Are the Biggest Phishing Trends Today?

According to the 2022 X-Force Threat Intelligence Index, phishing was the most common way that cyber criminals got inside an organization. Typically, they do so to launch a much larger attack such as ransomware. The Index also found that phishing was used in 41% of the attacks that X-Force remediated in 2021. That’s a 33% […]

The post What Are the Biggest Phishing Trends Today? appeared first on Security Intelligence.

QR Code Security: How Your Business Can Use Them Responsibly

The Coinbase Super Bowl ad sparked several conversations in my family. My son in college used the QR code to sign up to buy cryptocurrency, something he had been interested in for a while. My mother-in-law mistakenly scanned the code wondering what she could get for free. My husband scanned the code to get more […]

The post QR Code Security: How Your Business Can Use Them Responsibly appeared first on Security Intelligence.

Top 5 Cybersecurity Podcasts to Follow in 2022

One of my favorite parts about talking to cybersecurity professionals is asking how they landed in the industry. Few tell me about a straight path to their career, like attending college or earning a certification. Most launch into an interesting tale of their non-traditional career paths. When I share these stories, I’m often asked how […]

The post Top 5 Cybersecurity Podcasts to Follow in 2022 appeared first on Security Intelligence.

Why You Need a Diversity and Inclusion Program in Cybersecurity

This is a time of major changes for businesses and agencies. That includes the move to the cloud and the shift to being digital-first. So, cybersecurity has moved to a front-and-center position in many companies and industries. When talking about security, it’s easy to focus on the tools and technologies. After all, they’re what we […]

The post Why You Need a Diversity and Inclusion Program in Cybersecurity appeared first on Security Intelligence.

Expert Insights: What’s Next for Ransomware?

Last year, many organizations stopped talking about when the workforce would be back full-time in the office. Instead, they focused on how we build a hybrid work model for the future. 2021 was active and interesting – for lack of a better word. There’s a lot to say in terms of cyber crime in general […]

The post Expert Insights: What’s Next for Ransomware? appeared first on Security Intelligence.

10 Years Later, What Did LulzSec Mean for Cybersecurity?

While working on several articles on the WannaCry attacks for my job as a cybersecurity journalist, I learned about LulzSec, which ranked among the most notable attacks of the 2010s. I wanted to find out more about the group that committed major cybersecurity attacks on many household-name companies over a chaotic 50 days in 2011. […]

The post 10 Years Later, What Did LulzSec Mean for Cybersecurity? appeared first on Security Intelligence.

What Your Team Can Learn From the DHS Cybersecurity Hiring Program

Employees looking for cybersecurity jobs with the federal government can now use a new system and process. The Department of Homeland Security (DHS) recently launched its Cybersecurity Talent Management System (CTMS), which is more than a new system or website. The CTMS represents a new approach to hiring in the industry. Cyberattacks are on the […]

The post What Your Team Can Learn From the DHS Cybersecurity Hiring Program appeared first on Security Intelligence.

Cybersecurity Trends: IBM’s Predictions for 2022

After the challenging year of 2021, we look forward to what’s next in 2022. Over the past two years, we’ve seen a tremendous shift in how consumers and businesses accomplish tasks with the continued shift to digital and cloud. As a result of disappearing perimeters and increased digital data, cybersecurity attacks have, not surprisingly, increased. […]

The post Cybersecurity Trends: IBM’s Predictions for 2022 appeared first on Security Intelligence.

Public Wi-Fi Security: Is It Safe to Use for Business?

Let’s say you need to send an urgent email to a client while you’re at the store. Or, you’re traveling and need to take a Zoom call at your hotel. Maybe you need to access sensitive client data or employee information while on public Wi-Fi. You wonder how you should connect to the internet to […]

The post Public Wi-Fi Security: Is It Safe to Use for Business? appeared first on Security Intelligence.

What the SEC Requires From Businesses After a Data Breach

Consumers have become wary of data breaches and the decreased safety of their personal information. However, the cost of a data breach is no longer only a matter of money and your company’s good name. There is now a third critical reason to pay attention: the U.S. Securities and Exchange Commission — more commonly referred […]

The post What the SEC Requires From Businesses After a Data Breach appeared first on Security Intelligence.

Designing a BYOD Approach for the Future

Bring-your-own-device (BYOD) policies were some of the many things that changed when the COVID-19 pandemic hit. A study from Palo Alto Networks by ONR found 60% of companies expanded their BYOD policies to help employees manage the shift to remote work at the beginning of the pandemic. However, the convenience that the new BYOD policies […]

The post Designing a BYOD Approach for the Future appeared first on Security Intelligence.

7 Ways to Improve Your Cybersecurity Team’s Employee Satisfaction

Your organization depends on your cybersecurity team to keep its infrastructure and data secure. But this only happens when the employees you manage are engaged in their work. Many organizations see a high burnout rate among those in cybersecurity roles. It’s natural due to the stress and pressure that are an inherent part of the […]

The post 7 Ways to Improve Your Cybersecurity Team’s Employee Satisfaction appeared first on Security Intelligence.

How the 2011 DigiNotar Attacks Changed Cybersecurity for the Next Decade

The DigiNotar attack in 2011 set itself apart because it was an attack on the cybersecurity industry itself. Most attacks are on a single company. But this one shook trust in cybersecurity tools and how users decide whom to trust online. After covering this industry for years, I’ve seen firsthand how cyber attacks don’t happen […]

The post How the 2011 DigiNotar Attacks Changed Cybersecurity for the Next Decade appeared first on Security Intelligence.

What Is SASE and How Does it Connect to Zero Trust?

As many workplaces stay in a remote or a hybrid operating model due to COVID-19, businesses and agencies of all sizes and industries face the long-term challenges of keeping data and infrastructure secure. With remote workers, security teams have to secure many more endpoints and a much wider area each day. In response, many groups […]

The post What Is SASE and How Does it Connect to Zero Trust? appeared first on Security Intelligence.

Zero Trust: Remote Security For Now and the Future

This summer, my to-do list was full of stories about cybersecurity issues related to hybrid work. I was hopeful that the path to the end of the pandemic was ahead of us. Many companies announced their plans for keeping fully remote or hybrid workforce models with as much certainty as possible during a global pandemic. […]

The post Zero Trust: Remote Security For Now and the Future appeared first on Security Intelligence.

Identity Management Beyond the Acronyms: Which Is Best for You?

With so many devices and users accessing networks, applications and data, identity access management (IAM) has become a cornerstone of cybersecurity best practices. The short explanation is that you must make sure everyone (and everything) is who they claim they are. You also need to make sure they are allowed to have the access they’re requesting. […]

The post Identity Management Beyond the Acronyms: Which Is Best for You? appeared first on Security Intelligence.

6 Benefits of Using Privileged Access Management

When you think of access, passwords are likely the first thing that pops into your head. While passwords are a large and important part of managing access, there are other aspects to consider as well. Using the full spectrum offered by Privileged Access Management (PAM) can help. It’s easy to focus on the glitzier sides […]

The post 6 Benefits of Using Privileged Access Management appeared first on Security Intelligence.

Cybersecurity Training: How to Build a Company Culture of Cyber Awareness

When I attended new employee orientation at a global technology company several decades ago, I remember very brief cybersecurity training. The gist was to contact someone in IT if we noticed any potential issues. While I was with the company, I only thought about cybersecurity when I passed the server room, and I could only peek […]

The post Cybersecurity Training: How to Build a Company Culture of Cyber Awareness appeared first on Security Intelligence.

Starting Your AI Security Journey With Deep Learning

You’ve probably heard how using artificial intelligence (AI) can improve your cybersecurity — and how threat actors are using AI to launch attacks. You know that you need to use the same tools, if not better ones. AI security is about having the right tools, but also about having the right information.  But you aren’t […]

The post Starting Your AI Security Journey With Deep Learning appeared first on Security Intelligence.

5 Ways to Use Microlearning to Educate Your Employees About Cybersecurity

Trying to learn large amounts of information in one sitting is often overwhelming and leads to lower retention. Psychologist Hermann Ebbinghaus found in studying himself in the 1800s that only 20% of information learned is retained four weeks later. However, his retention increased from 80% to 90% when using microlearning. That means he took in […]

The post 5 Ways to Use Microlearning to Educate Your Employees About Cybersecurity appeared first on Security Intelligence.

Where Digital Meets Human: Letting HR Lead Cybersecurity Training

One of my favorite questions to ask when I’m interviewing a business decision-maker is if they are confident in their company’s current defenses. Most people tell me yes. So, I was surprised to read that an IDG Research Services survey commissioned by Insight Enterprises found that 78% of respondents reported that they do not think […]

The post Where Digital Meets Human: Letting HR Lead Cybersecurity Training appeared first on Security Intelligence.

The Post-Quantum Cryptography World Is Coming: Here’s How to Prepare

Have you ever sat in traffic and cursed the town planners? For years, you may have watched as the town approved new subdivisions and stores along the roads you drive often. And you wondered when they would add a new lane, extend a road or install a new stoplight. But think about this: If you’re […]

The post The Post-Quantum Cryptography World Is Coming: Here’s How to Prepare appeared first on Security Intelligence.

What Has Changed Since the 2017 WannaCry Ransomware Attack?

The cybersecurity world is still feeling the effects of the 2017 WannaCry ransomware attack today. While the majority of the damage occurred in the weeks after May 12, 2017, WannaCry ransomware attacks actually increased 53% from January 2021 to March 2021. While researching my in-depth article WannaCry: How the Widespread Ransomware Changed Cybersecurity, I learned […]

The post What Has Changed Since the 2017 WannaCry Ransomware Attack? appeared first on Security Intelligence.