The COVID-19 supply chain finds itself under fire in this month’s cybersecurity intelligence news. Learn about how another type of supply chain — the cloud through which we download a lot of our software — can also be a risk. And, how could your business make meaningful changes to your cybersecurity posture? Start on your journey to make the whole organization safer in just a month.
Sometimes, setting up a security team is like preparing for a big game. You need the right training, the right tools and the right people, and having all three makes all three better. So, another question we wanted to address this month is: how do you coordinate all of that at once? Check out our top advice and news from April.
Quick Briefs: Top Insights From April
3-Minute Read 🕒
How Vulnerability Management Can Stop a Data Breach
Today’s attack surface is always growing, with more applications and personal devices connecting to business networks. See how to turn the attack surface from a football field to a narrow swim lane with vulnerability management. And just like in sports, that means drafting the right people for the team. Experts in both offense and defense can take advantage of organized vulnerability management.
2-Minute Read 🕒
Over Half of Malware Delivered via Cloud Applications
More than half of malware attacks in 2020 were delivered via cloud applications, a study from Netskope shows. That isn’t a surprise, since cloud adoption is becoming so common, but it can be a good heads-up. These attacks don’t have to be complicated — 58% of the attacks the survey found were just infected Microsoft Office documents. Is your organization managing employees’ access to cloud apps safely? This way, you can shut doors like this in front of attackers.
4-Minute Read 🕒
Clean Sweep: A 30-Day Guide to a New Cybersecurity Plan
Take a broom to your dusty cybersecurity plan with this quick spring cleaning. Our 30-day plan presents practical steps for business leaders to make decisions about where their organizations stand when it comes to digital safety. Have a specific use case that you’re not sure how to handle? The plan is versatile enough to meet individual needs while staying within a standard schedule. By the end you’ll know how to build your cybersecurity needs in and solve some problems with automated systems.
Worth Your While: In-Depth Coverage To Sharpen Your Skills & Tighten Security
6-Minute Read 🕒
AI Security: How Human Bias Limits Artificial Intelligence
Human bias sneaks into the way we program artificial intelligence, too. Facial recognition and other image processing are always becoming more sophisticated. We need to be careful not to pass on assumptions to the technology we make. What if information may be harmful to one group and harmless to another? Julie Carpenter of California Polytechnic State University teaches the tech world about how to be sure our AI doesn’t just repeat our mistakes.
5-Minute Read 🕒
An Update: The COVID-19 Vaccine’s Global Cold Chain Continues to Be a Target
Attackers are using spear-phishing — personalized spam emails that use real contact information to trick executives into giving away personal or business information — to break into the physical COVID-19 vaccine cold chain. Threat actors are getting smarter. They’re neatening up the lure on phishing emails. Common signs of fakes, like misspellings or incorrect logos, aren’t always present anymore. Executives should be careful of emails impersonating legitimate business contacts.
5-Minute Read 🕒
3 Reasons Cyberattacks Are Increasing (and How Zero Trust Can Help)
With more and more people working at home, the problem of unknown devices is just getting bigger. It’s like how bugs sometimes emerge into the house in the spring. Attacks can come from gaps so small we don’t usually think about them. Our solution is zero trust, with which you can check access every time to keep out unexpected and unwanted intrusions. Take a look at the most common causes of cyberattacks today and how zero trust can close those gaps.
Where does your industry fall? See the full list of the most targeted industries and why attackers see them as the best pickings in this article.
Want to keep up with today’s cybersecurity news and best practices? Watch this space for the Security Intelligence newsletter.