cybersecurity
![thief](https://img.helpnetsecurity.com/wp-content/uploads/2018/11/09095826/thief-400x200.jpg)
Scammers using social media to dupe people into becoming money mules
Fraudsters are taking advantage of the widening fraud knowledge gap, outlining the urgent need for banks to educate and protect their customers with technology, according to …
![person](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092933/insider_threat-1-400x200.jpg)
The biggest data security blind spot: Authorization
Too many people have access to company data they don’t need. Also, too many companies focus on authentication (verifying identity) as a security measure and overlook the …
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
How companies are struggling to build and run effective cybersecurity programs
A recent Code42 report reveals a rapidly growing number of inside risk incidents and a concerning lack of training and technology, further exacerbated by increasing workforce …
![Data](https://img.helpnetsecurity.com/wp-content/uploads/2021/09/07091140/data_2-400x200.jpg)
CISOs struggling to protect sensitive data records
Almost all IT and security leaders (96%) globally are concerned their organization will be unable to maintain business continuity following a cyberattack, according to Rubrik. …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/27102024/ransomware_2_26082021-400x200.jpg)
Outdated cybersecurity practices leave door open for criminals
Organizations experienced a significant increase in ransomware – from an average of four attacks over five years in 2021 versus four attacks over the course of one year in …
![small business free cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/13095150/small_business_free_cybersecurity-1400-400x200.jpg)
5 free online cybersecurity resources for small businesses
As cyberattacks increase in frequency and sophistication, small and medium-sized businesses (SMBs) become more vulnerable to cyber threats. Unlike larger enterprises, SMBs …
![tools](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101144/tools-400x200.jpg)
Security beyond software: The open source hardware security evolution
Mention IT security, and most people immediately think of software-based protections against software-based threats: ransomware, viruses, and other forms of malware. But …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111830/ransomware-400x200.jpg)
Ransomware reinfection and its impact on businesses
Destructive ransomware attacks impact enterprises, governments, airlines, hospitals, hotels, and individuals, causing widespread system downtime, economic loss, and …
![ransomware](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/27102008/ransomware_1_26082021-400x200.jpg)
Quantifying cyber risk vital for business survival
Healthcare, manufacturing, and utilities are suffering long-term financial impact of major cyber attacks, according to ThreatConnect. “With the National Cyber Strategy coming …
![drown](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/11091551/drown-400x200.jpg)
Tight budgets and burnout push enterprises to outsource cybersecurity
With cybersecurity teams struggling to manage the remediation process and monitor for vulnerabilities, organizations are at a higher risk for security breaches, according to …
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100701/chess-400x200.jpeg)
Wargaming an effective data breach playbook
A well-tuned data breach playbook can provide security teams with a clear roadmap for working through the breach response process. Foreseeing every possible twist and turn of …
![skill development](https://img.helpnetsecurity.com/wp-content/uploads/2023/01/22160503/skill-development-1600-400x200.jpg)
Economic uncertainty drives upskilling as a key strategy for organizations
With the economy experiencing instability and decline, organizations rely on their technology experts to maintain their innovative edge and generate business value. Despite …
Featured news
Sponsored
Don't miss
- Grype: Open-source vulnerability scanner for container images, filesystems
- Signatures should become cloud security history
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks