A Roadmap for Implementing Cybersecurity Frameworks

| January 3, 2018

article image
Jackie Groark, Director, Security/CISO speaks at Veristor's Cybersecurity Tech Summit. Safeguarding your IT assets has never been more challenging. From phishing scams to insider threats, it is a never-ending problem for enterprises to keep the right people in and the wrong people out. To better address this challenge from the top down, Veristor assembled a panel of security leaders who are actively managing enterprise cybersecurity efforts. We heard from real-world experts who spoke to best practices and lessons learned as they work to establish the leadership, direction, and technical response their IT organizations use to combat real-world security threats.

Spotlight

OnMobile

OnMobile [NSE India: ONMOBILE], headquartered in Bangalore, India, and with offices in all regions of the world, delivers millions of music plays daily to mobile customers worldwide. Based on current deployments, OnMobile has the potential to reach more than 1.1 billion mobile users across several geographies.

OTHER ARTICLES

New Ransomware hitting Industrial Control Systems like a nuclear bomb

Article | February 10, 2020

Researchers at security firms including Sentinel One and Drago’s have been mystified by a piece of code named Ekans or Snake, over the last month. Drago’s publically released its full report on Ekans Ransomware that has recently inflicted Industrial Control Systems and these are some of the most high-value systems that bridge the gap between digital and physical systems. In the history of hacking, only a few times a piece of malicious code has been marked attempting to intrude Industrial Control Systems. Ekans is supposed to be the first Ransomware with real primitive capability against the Industrial Control Systems, software, and hardware used in everything from oil refineries to power grids. Researchers say this ransomware holds the capability to attack ICS by Honeywell and GE as well.

Read More

Best Cybersecurity Tips for Remote Workers

Article | February 10, 2020

Remote working and cybersecurity risks, unfortunately, go hand in hand. As the COVID-19 pandemic appears to be far from over, cyber threats to individuals and businesses continue to loom large. The only solution at the moment is to invest in robust technology solutions that protect your network and to train employees in cybersecurity so that they develop healthy remote working practices. If you allow a bulk of your employees to work remotely, it is important to adopt a few basic habits to protect your devices and your business network from cyber criminals. Here’s a quick look at a few basic tips for remote workers that can go a long way in enhancing the overall security posture of your organisation. Passwords provide the first line of defense against unauthorized access to your devices and personal information. By creating a strong, unique password, you increase protection levels tremendously. You make it more challenging for cybercriminals to gain access and disrupt your systems networks. Rule number two is never to ignore those little pop-up windows that tell you that software updates are available for your device. Once you get such a notification, be sure to install the latest software as soon as possible. Timely software updates (including antivirus updates) help patch security flaws and safeguard the computer system. Are you busy with your work and don’t like to be distracted by such notifications? We highly suggest you encourage your employees to select auto-update for software on both mobile devices and computers. It will help you and your staff to prevent problems caused by delayed system updates.

Read More

NCSC makes ransomware attack guidance more accessible

Article | February 10, 2020

The UK’s National Cyber Security Centre (NCSC) has updated its guidance to organisations on how to mitigate the impact of malware and ransomware attacks, retiring its standalone ransomware guidance and amalgamating the two in a bid to improve clarity and ease confusion among business and consumer users alike. The NCSC said that having two different pieces of guidance had caused some issues as a lot of the content relating to ransomware was essentially identical, while the malware guidance was a little more up-to-date and relevant. The service said the changes reflect to some extent how members of the public understand cyber security. For example, it implies a distinction between malware and ransomware even though technically speaking, ransomware is merely a type of malware. “Not everyone who visits our website knows that. Furthermore, they might well search for the term ‘ransomware’ (rather than ‘malware’) when they’re in the grip of a live ransomware incident,” said a spokesperson.

Read More

A Closer Look at the Microsoft Exchange Server Cyberattacks

Article | February 10, 2020

We recently posted an article that highlighted the high-profile Microsoft Exchange hack that impacted hundreds of thousands of organizations across the globe. (This article offered some recommendations on how this could have been avoided as well as a special three-month offer to help any company who may have been affected.) Since this cyber attack, even more details are emerging. For example, the White House recently urged victims to quickly patch applications and systems and pushed for them to do it as quickly as possible. One senior administration official emphasized that the window to update these systems could be measured in hours, not even days.

Read More

Spotlight

OnMobile

OnMobile [NSE India: ONMOBILE], headquartered in Bangalore, India, and with offices in all regions of the world, delivers millions of music plays daily to mobile customers worldwide. Based on current deployments, OnMobile has the potential to reach more than 1.1 billion mobile users across several geographies.

Events