You are here

Cybersecurity

Cyber Readiness – International Organizations Publish New Guidance

The Australian Government just released its Ransomware Action Plan to confront the increasing threat posed by ransomware threat actors. The plan describes the capabilities and authorities that Australia will employ to tackle the ransomware menace and provides information for ransomware victim’s seeking help. Specifically, the plan calls for legislation mandating ransomware incident reporting, creating specific stand-alone offense for all forms of cyber extortion, and creating a stand-alone aggravated offence for cybercriminals who target critical infrastructure.

Cybersecurity Awareness Week 2: Three Fundamentals for Shoring Up Phishing Defenses

This post is leveraged from the CSAM Champions resources and is recommended to be provided to end users.

From ransomware to SolarWinds, the cyber threat landscape has been as hectic as it has ever been over the last 12-24 months. However, for all of the emerging threats and news that are cropping up on the horizon, phishing – one of the oldest pain points in cybersecurity – is continuing to wreak havoc, and is as big of a threat as it has ever been.

Siemens [Virtual] Executive Cybersecurity Forum for Water and Wastewater: Thursday, Oct 14

On Thursday, WaterISAC’s Michael Arceneaux will open the Siemens Executive Cybersecurity Forum for Water and Wastewater. At this free, virtual event, Michael will talk about how the cybersecurity landscape has changed in the last several months, what the future may hold in terms of regulations and resources, and what opportunities may be ahead for the sector.

End User Protection - Microsoft Scheduled to Disable Excel 4.0 XLM Macros by Default

Macros have been a long time favorite of users and threat actors alike. Unfortunately, the same automation that macros afford users for efficiency and convenience have also been abused by threat actors to launch cyber attacks - most notably, Excel 4.0 XLM macros in phishing emails. Some organizations globally disable macros, but for those that have not, be advised that Microsoft will begin disabling Excel 4.0 XLM macros by default in Microsoft 365 tenants. This action is designed to protect users from the less secure macros that are still in use (and abuse) today.

Cybersecurity Awareness – The Key to Reduce Phishing Starts in the Mind

While phishing continues to be one of the most common cyber attack techniques – through training and awareness – it is also one of the easiest threats to reduce the likelihood of success. In the interest of Cybersecurity Awareness Week 2, Fight the Phish, IBM’s SecurityIntelligence has a good post on how the key to fight phishing starts in the mind.

New Report Highlights REvil Dominance in Ransomware

A new report by McAfee details the increasing prevalence of ransomware and cloud security threats. The study, Advanced Threat Research Report: Oct - 2021, highlights that ransomware attacks continued to increase and were one of the most prevalent forms of cyberattacks in the second quarter of 2021. In particular, the ransomware group REvil/Sodinokibi accounted for 73 percent of all ransomware detections in the second quarter, according to the report.

Cyber Incident Response – Don’t Fail to Plan

The worst time to figure out what you are going to do about an incident is in the middle of the incident – cyber or physical. From fire drills to business continuity exercises, it has become standard practice for organizations to develop and drill on physical incident plans. Conversely, few organizations develop and practice cyber incident response plans, despite the endless barrage of cyber attacks. Organizations with an effective cyber incident response plan will limit damage and reduce recovery time and costs of a cyber incident or attack.

Pages

Subscribe to Cybersecurity