cybersecurity

Browse by

Clear

cybersecurity

Improving Cybersecurity Awareness in Healthcare

Many cyberattacks succeed due to mistakes by employees and a lack of awareness of basic aspects of cybersecurity. According to the 2022 Verizon Data Breach Investigations Report, 82% of data breaches in 2021 involved the human element.

cybersecurity

What NIST 800-53 Revision 5 Means to Cybersecurity

NIST Special Publication (SP) 800-53, Revision 5, Security and Privacy Controls for Information Systems and Organizations, represents a multi-year effort to develop the next generation of security and privacy controls needed to strengthen and support .

cybersecurity

Urgency of Cyber Security After Colonial Pipeline

On May 7, 2021, Colonial Pipeline, Co. was forced to close operations after a ransomware hack was confirmed to have breached their systems. This attack hindered services to the East-coast of the United States and sparked fears of a massive gas shortage to American motorists. This hack greatly compromised Colonial Pipeline’s system integrity and put private data at risk.

cybersecurity

Best Practices for Securing Educational Resources in the Age of Distance Learning

According to Microsoft’s Global Threat Activity Tracker, more than 4.7 million malicious software (or “malware”) incidents were detected in the education industry worldwide in June 2020 – which accounted for more than 60 percent of all the corporate and institutional malware incidents reported during the month, the most affected industry by far. More than 20 universities and charities across the United States, United Kingdom, and Canada reported that they were compromised by a cyberattack.

cybersecurity

COVID-19 and Remote Work Security Challenges

Since the COVID-19 outbreak in January 2020 and pandemic declaration in late March, organizations and federal agencies have been scrambling to secure their systems and create remote work contingency plans to keep continuity for their business matters.

cybersecurity

Securing Your Assets Against Cybersecurity Threats

According to the U.K.’s National Cyber Security Centre (NCSC) July 2020 advisory, hackers are using phishing tools and spear-phishing tactics in an attempt to steal coronavirus (COVID-19) vaccine data and intellectual property assets from a number of medical research companies.

cybersecurity

Role and Impact of Women in Technology

Even with the underrepresentation of women in the technology industry, many women have taken leadership roles in the industry and are recognized globally. This article gives a brief history of women in technology, and the impact of women today in enhancing diversity in the technology industry. At Wilson Consulting Group, we value the role women have in the technology field and the influence they bring to the cybersecurity sector.

cybersecurity

Global Privacy Laws and Data Protection Regulations

The protection of employee and consumer data has become a priority for companies and organizations, especially with the ever-increasing potential for liability due to the use of new technologies. The collection and management of data require a broad range of legal compliance activities. It is essential to prioritize and protect sensitive, confidential, and proprietary information. Data breaches or losses can have a substantial adverse effect on a company’s financials and reputation. This article discusses several privacy laws expected to guide organizations in the protection of their information assets, and the privacy rights of individuals, through compliance.

cybersecurity

Surviving Security Risks Existent in Third-Party Software

Third-Party Software is comprised of software libraries, modules and other components that are either purchased from a third-party vendor or made freely available. It includes open source software and commercial off-the-shelf components, which are components that are available for use straight away instead of building entirely from scratch, thereby reducing application development time.

cybersecurity

Ways to Mitigate Social Engineering-based Cyber Attacks

Social engineering is an attack mechanism majorly aimed at misleading employees or individuals to hand over relevant information for the attacker’s financial gain. Social engineering attacks are launched mostly via email, social media, and over the phone.

Subscription Center

Stay in the Know with Our Newsletter