You are here

Cybersecurity

Siemens [Virtual] Executive Cybersecurity Forum for Water and Wastewater: Thursday, Oct 14

On Thursday, WaterISAC’s Michael Arceneaux will open the Siemens Executive Cybersecurity Forum for Water and Wastewater. At this free, virtual event, Michael will talk about how the cybersecurity landscape has changed in the last several months, what the future may hold in terms of regulations and resources, and what opportunities may be ahead for the sector.

End User Protection - Microsoft Scheduled to Disable Excel 4.0 XLM Macros by Default

Macros have been a long time favorite of users and threat actors alike. Unfortunately, the same automation that macros afford users for efficiency and convenience have also been abused by threat actors to launch cyber attacks - most notably, Excel 4.0 XLM macros in phishing emails. Some organizations globally disable macros, but for those that have not, be advised that Microsoft will begin disabling Excel 4.0 XLM macros by default in Microsoft 365 tenants. This action is designed to protect users from the less secure macros that are still in use (and abuse) today.

Cybersecurity Awareness – The Key to Reduce Phishing Starts in the Mind

While phishing continues to be one of the most common cyber attack techniques – through training and awareness – it is also one of the easiest threats to reduce the likelihood of success. In the interest of Cybersecurity Awareness Week 2, Fight the Phish, IBM’s SecurityIntelligence has a good post on how the key to fight phishing starts in the mind.

New Report Highlights REvil Dominance in Ransomware

A new report by McAfee details the increasing prevalence of ransomware and cloud security threats. The study, Advanced Threat Research Report: Oct - 2021, highlights that ransomware attacks continued to increase and were one of the most prevalent forms of cyberattacks in the second quarter of 2021. In particular, the ransomware group REvil/Sodinokibi accounted for 73 percent of all ransomware detections in the second quarter, according to the report.

Cyber Incident Response – Don’t Fail to Plan

The worst time to figure out what you are going to do about an incident is in the middle of the incident – cyber or physical. From fire drills to business continuity exercises, it has become standard practice for organizations to develop and drill on physical incident plans. Conversely, few organizations develop and practice cyber incident response plans, despite the endless barrage of cyber attacks. Organizations with an effective cyber incident response plan will limit damage and reduce recovery time and costs of a cyber incident or attack.

Cyber Hygiene – Protecting Executives Against BEC Attacks

Business email compromise (BEC) attacks cost organizations millions of dollars every year and there are no signs of them abating any time soon. In addition, executive level (C-suite) email accounts are witnessing significant numbers of attacks and their network privileges are making defensive measures more challenging. As such, there are a few simple cyber hygiene measures organizations can implement to protect themselves and mitigate further attacks. First, executives should receive role-based awareness training for recognizing suspicious emails.

Pages

Subscribe to Cybersecurity