You are here

Cybersecurity

Third-Party Risk Management – Evaluating Cyber Risk Posed by IT and Managed Service Providers

Despite AWIA Section 2013 and/or cyber insurance requirements, do you still struggle with risk management? Even more so with your third-party – vendors, contractors, consultants, and integrators – relationships? As organizations struggle with assessing risk across their own organizational attack surface, it’s often more challenging to assess the cyber risk posed from and preparedness of third-party partners (new and existing). Many aren’t sure where to start or even what questions to ask of these trusted partners – perhaps even more so with technology services partners.

Cyber Resilience – Considerations for Cyber Insurance Coverage in 2023

CSO Online posted an article discussing what potential purchasers of cyber insurance should be aware of in the new year. As the number of companies reporting attacks to insurers increases, so have the requirements for the purchase or renewal of policies. There are two broad trends impacting cyber insurance: insurers requiring a stronger security posture from organizations and the increasing cost of insurance.

Resilience – Are you Confident in your Cyber Resilience?

Does cyber resilience keep you up at night? How confident are you in defending your utility’s cyber resilience status? Cisco’s newest Security Outcomes Report - Volume 3 may help as it explores seven success factors for boosting cyber resilience. In developing the report, Cisco asked 4,700 practitioners across 26 countries what security resilience means to them, what they’re doing successfully to achieve it, and what they’re struggling with.

Threat Awareness – Social Engineering Success Drives Dark Web Demand for Information Stealers

According to a recent report by Accenture, the successful combination of stolen credentials and social engineering tactics to breach networks is increasing the demand for information stealers on the Dark Web. Specifically, Accenture notes a marked increase in the number of Dark Web advertisements for new information stealer malware variants. The report also discusses how the success of MFA fatigue attacks has contributed to this increased demand.

Ransomware Resilience – Best Practices to Block Ransomware on Endpoints

Sophos has written a blog post detailing six best practices from an updated version of its report on endpoint-related best practices for protecting against ransomware. The best practices include: turning on all policies and features of an endpoint, regularly reviewing the endpoint’s exclusions, enabling multi-factor authentication, ensuring endpoints are up-to-date and protected, maintaining general IT hygiene, and proactively hunting for adversaries within your network.

Pages

Subscribe to Cybersecurity