Author Archives: Sanofiya Shelat

New Security Awareness Practitioner Certification

Recognizing that the weak link in most security chains is human beings, the InfoSec Instituteannounced a new certification for security awareness practitioners. The Certified Security Awareness Practitioner (CSAP) boot camp is an intensive

The post New Security Awareness Practitioner Certification appeared first on The Cyber Security Place.

How did the TimeHop data breach happen?

Compromise of an employee’s credentials, lack of multi-factor authentication, and weak insider threat analysis all played a factor in the recent TimeHop data breach in which 21 million user accounts

The post How did the TimeHop data breach happen? appeared first on The Cyber Security Place.

Over 60 percent of organisations fail to follow basic security benchmarks

Businesses are falling behind on their cyber hygiene. Security firm Tripwire has released its State of Cyber Hygiene Report detailing how organisations fall behind on basic cybersecurity practices. In its report, Tripwire

The post Over 60 percent of organisations fail to follow basic security benchmarks appeared first on The Cyber Security Place.

Data of Thousands of Card Applicants Exposed

The breach apparently occurred from March 2017 to mid-July of 2018. Credit card issuer TCM Bank, which works with some 750 small and community U.S. financial institutions, including credit unions, exposed

The post Data of Thousands of Card Applicants Exposed appeared first on The Cyber Security Place.

Over 20 Flaws Discovered in Popular Healthcare Software

Multiple vulnerabilities in a popular healthcare software provider’s products may have put at risk the data of over 90 million patients. OpenEMR develops open source electronic health record (EHR) and

The post Over 20 Flaws Discovered in Popular Healthcare Software appeared first on The Cyber Security Place.

Four Long-Term Strategies To Improve Your Company’s Data Security

The following strategies are significant shifts you can use to improve your data security. They’ll take time and resources to implement. However, they all contribute to significantly better cybersecurity in

The post Four Long-Term Strategies To Improve Your Company’s Data Security appeared first on The Cyber Security Place.

Three essential pillars of transparent data security

Is your organisation prepared to handle and secure data across a diverse range of device types? Data security practices that disrupt workflow place an undue burden on users and administrators.

The post Three essential pillars of transparent data security appeared first on The Cyber Security Place.

Breach Accountability: Blaming the CISO vs An End to Shaming

Should a CISO carry the can if a business suffers damage from a hacking attack? This question must sit in the back of the average CISO’s mind more and more

The post Breach Accountability: Blaming the CISO vs An End to Shaming appeared first on The Cyber Security Place.

The New Age of Accountability

The EU has been busy in the cybersecurity department, and for good reason. Given Europe’s ever-rising cybercrime rates, a new approach to data protection was in order. This cued the

The post The New Age of Accountability appeared first on The Cyber Security Place.

Should We be Looking Down Under to Improve Our Security?

Security is a global problem, so it makes sense that we look beyond our own borders for a solution. One source of inspiration in its approach to security is the Australian

The post Should We be Looking Down Under to Improve Our Security? appeared first on The Cyber Security Place.

How ‘Projection’ Slows Down the Path to Security Maturity

A little bit of self-awareness goes a long way when it comes to evaluating a company’s security maturity level. It’s also a prerequisite to improving. Recently, I observed a somewhat

The post How ‘Projection’ Slows Down the Path to Security Maturity appeared first on The Cyber Security Place.

Phishing in the Deep End: The Growing Threat of Attacks Beyond Email

Phishing has long posed a threat to businesses thanks to attackers who convince users to open harmful email attachments and executable links. As a result, companies have strengthened malware blocking

The post Phishing in the Deep End: The Growing Threat of Attacks Beyond Email appeared first on The Cyber Security Place.

From National Security to Cybersecurity

In an effort to address the growing skills gap in the cybersecurity industry, a team of former Royal Marines Commandos have launched a business providing free cybersecurity training, accredited qualifications

The post From National Security to Cybersecurity appeared first on The Cyber Security Place.

To Grow The Internet Of Things, Improve Security

The Internet of Things continues to grow rapidly, but concerns about security remain a significant barrier and are hindering the adoption of IoT devices.Research by Bain & Company finds that

The post To Grow The Internet Of Things, Improve Security appeared first on The Cyber Security Place.