Archive for the ‘cyber security’ Category

SMBs are hardest-hit by ransomware

Coalition announced the mid-year update to its 2022 Cyber Claims Report detailing the evolution of cyber trends, revealinig that small businesses have become bigger targets, overall incidents are down, and ransomware attacks are declining as demands go unpaid. During the first half of 2022, the average cost of a claim for a small business owner increased to […]

Leave a Comment

CISA adds 10 new flaws to its Known Exploited Vulnerabilities Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 10 new flaws to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 10 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, including a high-severity security flaw ( CVE-2021-38406  CVSS score: 7.8) impacting Delta Electronics industrial automation software. According to Binding Operational Directive (BOD) […]

Leave a Comment

Digital Ethics Book Bundle

As technology advances, so must our ability to use such technology ethically. The rise of AI (artificial intelligence) and big data raises concerns about data privacy and cyber security. ITG have combined their latest titles into one bundle, saving you 20% – ideal for bank holiday reading. Digital Ethics Book Bundle Understand the growing social, […]

Leave a Comment

SMB’s cybersecurity solutions to remediate risk

We have build cybersecurity solution sheets for our clients which we would like to share with you. This can be a useful resource when there is a need to remediate risk. These are in pdf format which you can download. Privacy guidance, audits, tools, training and software Certification of individuals Cybersecurity Solutions NIST Gap Assessment […]

Leave a Comment

Start as you mean to go on: the top 10 steps to securing your new computer

Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer’s pc, learn the steps to protect your new PC from cyberthreats. With Windows 11 making headlines for all the right reasons, it could be a great time to invest in a new PC for the family or the home office. […]

Leave a Comment

Cybersecurity Solutions

Cybersecurity reduces the risk of cyber-attacks and protects against the unauthorized exploitation of systems, networks and technologies. Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering DISC InfoSec #InfoSecTools and #InfoSectraining #InfoSecLatestTitles #InfoSecServices Ask DISC an InfoSec & compliance related question

Comments (1)

State of Cybersecurity 2022

State of Cybersecurity 2022 – via ISACA State of Cybersecurity 2022, Global Update on Workforce Efforts, Resources and Cyberoperations reports the results of an eighth annual global study that looks at the following topics and more: What are the top cybersecurity hiring challenges today? Which cybersecurity skills are in highest demand? How can companies improve retention? […]

Leave a Comment

How to support women in cybersecurity

Cybersecurity is required to be a dynamic industry because cybercriminals don’t take days off. Cybersecurity professionals must be innovative, creative, and attentive to keep gaining the upper hand on cybercriminals. Unfortunately, there are millions of unfilled cybersecurity job openings around the globe. The gender divide The problem of not enough cybersecurity professionals is exacerbated by a lack […]

Leave a Comment

10 Steps to Cyber Security

Steps to Better Security: A Simple Cyber Resilience Guide for Business

Leave a Comment

What Security Engineers Hate About SIEM

SIEM Satisfaction is Mediocre When CISOs, CIOs, CTOs, security engineers, security analysts and security architects were asked to rank the primary capabilities of a traditional SIEM according to how satisfied they were with those capabilities, an interesting picture emerged. The survey results indicated that every primary capability of traditional SIEM solutions, at best, only somewhat […]

Leave a Comment

Cyber security for construction businesses

Building an Effective Cybersecurity Program

Comments (2)

3 key elements of a strong cybersecurity program

The world relies on technology. So, a strong cybersecurity program is more important than ever. The challenge of achieving good cyber hygiene can be especially acute for small- and medium-sized businesses. This is particularly true for those with fully remote or hybrid work environments. Add to the mix limited resources and limited talent focused on cybersecurity, and […]

Leave a Comment

Critical Infrastructure Attacks Spur Cybersecurity Investment

The attacks on critical industrial systems such as Colonial Pipeline last year pushed industrial cybersecurity to center stage. And with the threat of war between Russia and Ukraine, experts warned nations that a global flare-up of cybersecurity attacks on critical infrastructure could be looming. In late January, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) put critical […]

Leave a Comment

10 Steps to Cyber Security

8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Harden your business against internal and external cybersecurity threats with a single accessible resource.  In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering […]

Leave a Comment

14 CYBER SECURITY PREDICTIONS FOR 2022 AND BEYOND

14 Cyber Security Predictions For 2022 – by Mandiant Blackout Warfare: Attacking The U.S. Electric Power Grid A Revolution In Military Affairs

Leave a Comment

Cyber Security in mergers and acquisitions

Guide to Cybersecurity Due Diligence in M&A Transactions

Leave a Comment

10 Steps to Cyber Security

Cybersecurity Program Development for Business: The Essential Planning Guide

Leave a Comment

Cyber security small business guide

Cybersecurity Program Development for Business: The Essential Planning Guide

Leave a Comment

How can a business ensure the security of their supply chain?

10 best practices to evaluate a supplier’s risk While there are no guarantees that a business can detect a supply chain attack before it happens, there are 10 best practices that a business can consider to help mitigate risk and validate the security of its supply chain. 1. Evaluate the impact each supplier can have […]

Leave a Comment

How Virtualization Helps Secure Connected Cars

Connected cars create opportunities to deliver enhanced customer experiences. At the same time, they also have the potential to provide high cost and revenue benefits. This is true for connected car companies, OEMs, suppliers and insurers (and much, much more). However, car companies haven’t really explored the opportunities to monetize customer data adequately. We can […]

Leave a Comment