privileged accounts

The Exploitation of Privileged Accounts 

The flow of news about data breaches and ransomware attacks is relentless. Businesses of all sizes—large companies included—continue to suffer. Not only do cyber attacks lead to financial damage, but they have knock-on effects like reputational impact and loss of client trust.  What’s less publicized is just how often these breaches are caused by vulnerabilities in privileged accounts.  Privileged accounts …

Stolen Credentials

How Stolen Credentials and Ransomware are a Simultaneous Threat

Defending from Both Directions Over the past decade, the cyber landscape has evolved rapidly. But as Mike Wilson points out for Forbes, with every positive change or technological advancement comes several layers of cyber threat, as criminals continue to seek out weaknesses wherever they can.  Each year the Verizon DBIR provides an overall update on current threat trends and provides insight into who …

The Biggest Takeaway from the 2022 Verizon DBIR

The annual Verizon Data Breach Investigations Report (DBIR) contains several useful security insights. Reflecting on another year where cybersecurity attacks have frequently starred in news headlines, the 2022 DBIR confirms a lot of what professionals already know: cyber attacks continue to increase in frequency, and organizations of all sizes need to bolster their defensive postures in order to stay safe.  …

ITRC

ITRC Breach Annual Report: Key Findings

The Identity Theft Resource Center (ITRC) is a nationally recognized nonprofit organization “established to support victims of identity crime.” The recently released Data Breach Annual Report provides statistics and perspectives on cyberattacks. Here’s what organizations need to know: The overall number of data breaches rose a whopping 68 percent in 2021. There were 1,862 individual breaches last year, surpassing 2020’s …

Trends 2022

Top Cybersecurity Issues to Watch Out For in 2022

One of the most challenging aspects of cybersecurity is preparedness. With technology, user habits, and attack styles changing over the past few years and showing no sign of slowing down, cyberattacks seem like a never-ending onslaught. As we start 2022, organizations need to do their best and prepare for future incidents. Auditing and evaluating the state of their internal security …

Keizer Cybersecurity

The City of Keizer Enhances Cybersecurity by Eliminating Compromised Passwords

The City of Keizer is a beautiful community in the Willamette Valley of Oregon. The city offers an ideal environment, delivering a range of services to citizens, from parks and public works to police protection. However, even from its earliest days, there have been hazards to overcome. As a settlement in the 1800s, floods forced the community to rebuild on …

ransomware (1)

Reimagining Ransomware Responses

Planning, Protecting and Not Paying Your company is aware of the many attempts that hackers make every day to infiltrate organizations, steal data, and demand ransoms. Hacking methods seem to propagate rapidly, but ransomware has been making the headlines regularly in the past two years. Ransomware, a form of malware, accounted for about ten percent of the breaches collated in …

ransomware

To Pay Up or Not Pay Up

Investigating the repercussions of ransomware attacks The number of ransomware attacks and the frequency of institutions paying those ransomshas increased over the past years. Unfortunately, this hasn’t correlated with those institutions getting their data or systems back. So, should organizations stop paying ransoms? What is ransomware? Ransomware is a type of malware that encrypts the victim organization or individual’s data. …