You are here

Cybersecurity

Identifying and Reporting Data Breaches

In today’s digitally interconnected global community, almost every organization will experience a data breach at some point. Data breaches come in many forms and include: data accessed by an unauthorized third party, theft of login data, loss of an electronic device, and confidential data distributed to a mailing list. In 2020, more than 37 billion records were exposed at an average cost of $3.86 million per breach.

The Business Case for Security

The Cybersecurity and Infrastructure Security Agency (CISA) has created a resource intended to assist security staff with making the business case for security improvements, for both physical and cyber, to senior leaders and other personnel who control budgets. It provides statistical data on common physical and cybersecurity challenges, as well as suggestions for first steps and resources to assist organizations in bolstering their security postures.

CISA Cybersecurity Workforce Training Guide

The Cybersecurity and Infrastructure Security Agency (CISA) released a new training manual last week for current and future federal, state, local, tribal, and territorial personnel looking to develop their cybersecurity skills. This new guide, titled the Cybersecurity Workforce Training Guide, includes over 100 training and certification prep courses for cybersecurity professionals along with access to resources from across the government. These training programs and tools provide opportunities at every proficiency level, from beginner through advanced.

Australian Government Warns of Escalating LockBit Ransomware Attacks

The Australian Cyber Security Centre (ACSC) has issued a security alert advising of an increase in reports from Australian organizations that have been impacted by LockBit 2.0 ransomware. The ACSC reports this activity has occurred across multiple industry sectors and that, in addition to demands for ransom payments, victims have received threats that data stolen during the incidents will be published. To help organizations further understand and protect themselves from this activity, the ACSC has published a profile on LockBit 2.0.

“Get Your Stuff Off Search” – CISA Promotes Tools for Finding ICS Devices Exposed to the Internet

The Cybersecurity and Infrastructure Security Agency (CISA) has published a series of resources designed to help critical infrastructure organizations reduce internet attack surfaces that are visible to anyone on web-based search platforms. CISA calls this program “Get your Stuff Off Search” and focuses much of its attention on the risks posed to exposed industrial control systems and the potential for impacts to public safety, human life, and national security.

Pages

Subscribe to Cybersecurity