The State of Industrial Cybersecurity 2017

| August 30, 2017

article image
Clearly, there is a great deal of work to be done to ensure that industrial companies are best protected as possible against the increasing risk of cyber security breaches in their ICS environments. Industrial cyber incidents happen frequently – over half of the sample had experienced at least one incident in the last 12 months. But despite awareness of and claimed readiness for infractions, companies are often underestimating both the source and impact of such incidents. It’s essential that steps are taken to identify the risks to ICS environments, with the rigorous policies and procedures put in place to manage those risks so that the company is in the best possible position to secure its operational technology.

Spotlight

HelpSystems

HelpSystems is a leading provider of systems and network management, business intelligence, and security and compliance solutions. Our software reduces data center costs by improving operational control and delivery of IT services. Founded in 1982, we have offices worldwide and more than 8,700 customers from small businesses to Fortune 100 companies. Based in Minneapolis, Minnesota, our mission is to be an expert provider of data center software that solves real business problems.

OTHER ARTICLES

What Lessons Can We Takeaway from Las Vegas’ Recent Thwarted Cyberattack?

Article | February 27, 2020

Picture this: a news story detailing a cyberattack in which no data was exfiltrated, thousands (or even millions) of credit card details weren’t stolen, and no data was breached. While this isn’t the type of headline we often see, it recently became a reality in Las Vegas, Nev. On January 7, 2020, news broke that the city of Las Vegas had successfully avoided a cyberattack. While not many details were offered in the city’s public statement, local press reported that the attack did employ an email vector, likely in the form of a direct ransomware attack or phishing attack. The use of the word “devastating” in the public statement led many to believe ransomware was involved. This inference isn’t farfetched—and is likely a correct conclusion—given that cities throughout the U.S. have seen ransomware attacks on critical systems. Attacks that have cost those cities millions of dollars.

Read More

Guide to Cloud Security Certification: Which Ones Are the Best of the Best?

Article | April 27, 2021

As your organization looks to move to cloud computing, security certification will become more critical. Cloud solutions have unique security considerations that are different from an on-premise solution. IT professionals that are managing these solutions should be well-versed in multi-layered protection, encryption, monitoring, and more. Not only is certification important for your own IT staff, but it should also be part of your recruiting strategy. Experience combined with certifications can be invaluable foclr protecting your cloud environment. You want to ensure that the data you store in the cloud is protected from security threats.

Read More

5G and IoT security: Why cybersecurity experts are sounding an alarm

Article | March 2, 2020

Seemingly everywhere you turn these days there is some announcement about 5G and the benefits it will bring, like greater speeds, increased efficiencies, and support for up to one million device connections on a private 5G network. All of this leads to more innovations and a significant change in how we do business. But 5G also creates new opportunities for hackers.Gartner predicts that 66% of organizations will take advantage of these benefits and adopt 5G by 2020 — with 59% of them planning to use 5G to support the Internet of Things across their business. Already, manufacturers including Nokia, Samsung, and Cisco have either started developing 5G enterprise solutions or have publicly announced plans to do so. In the enterprise, full deployment of private 5G networks will take time, as it requires significant investments to upgrade legacy network infrastructures, observers say. In the meantime, there are instances of devices in the workplace already operating on a 5G network.

Read More

EMAIL SECURITY CONCEPTS THAT NEED TO BE IN YOUR EMAIL INFOSEC POLICY

Article | June 16, 2021

Compliance requirements have become more complex because of the continual evolution of security threats and vulnerabilities. Many organizations fail to create an extensive security program to cover their challenges. Emails are one of the most susceptible channels for cyber-criminals to operate. This is why every organization must pay keen attention to email security policies in cybersecurity. Because emails are prone to cyberattacks, enterprises and individuals must take critical measures to secure their email accounts against unauthorized access. Malicious actors use phishing to trick recipients into sharing sensitive information, either by impersonating trusted contacts or legitimate business owners. Email is still one of the most vulnerable avenues for hackers and cyber crooks. Here are the critical email security concepts that need inclusion into your information security policy.

Read More

Spotlight

HelpSystems

HelpSystems is a leading provider of systems and network management, business intelligence, and security and compliance solutions. Our software reduces data center costs by improving operational control and delivery of IT services. Founded in 1982, we have offices worldwide and more than 8,700 customers from small businesses to Fortune 100 companies. Based in Minneapolis, Minnesota, our mission is to be an expert provider of data center software that solves real business problems.

Events