Remove CSO Remove Phishing Remove Risk
article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

Let’s walk through some practical steps organizations can take today, implementing zero trust and remote access strategies to help reduce ransomware risks: •Obvious, but difficult – get end users to stop clicking unknown links and visiting random websites that they know little about, an educational challenge. Best practices.

article thumbnail

Cybersecurity’s Comfort Zone Problem: Are you Guilty of it?

Jane Frankland

Instead of focusing on accessible, impactful solutions like human risk management, we gravitate toward shiny new technologiestools and systems that feel exciting, measurable, and comfortably within our domain of expertise. The hard truth is that technology alone cant fix the root causes of cyber risk.

Risk 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

10 top anti-phishing tools and services

CSO Magazine

Phishing continues to be one of the primary attack mechanisms for bad actors with a variety of endgames in mind, in large part because phishing attacks are trivial to launch and difficult to fully protect against. Why phishing is successful. Most phishing attacks are less about the technology and more about social engineering.

Phishing 136
article thumbnail

How attackers could exploit breached T-Mobile user data

CSO Magazine

The exposed details differed across different types of customers, so the level of risk users are exposed to varies. These include SMS/text-based phishing, SIM swapping and unauthorized number porting. Related: The T-Mobile data breach: A timeline | Get the latest from CSO by signing up for our newsletters. ]

Mobile 144
article thumbnail

12 risk-based authentication tools compared

CSO Magazine

Risk-based authentication (RBA), also called adaptive authentication, has come of age, and it couldn’t happen fast enough for many corporate security managers. What is risk-based authentication? It creates a risk profile of the person or device requesting access to the system. To read this article in full, please click here

article thumbnail

Cyber insurer launches InsurSec solution to help SMBs improve security, risk management

CSO Magazine

Cyber insurance provider At-Bay has announced the launch of a new InsurSec solution to help small-to-mid sized businesses (SMBs) improve their security and risk management postures through their insurance policy. The emergence of InsurSec technology reflects a cyber insurance landscape that has seen significant change recently.

article thumbnail

BrandPost: New and evolving phishing attacks using AI platforms like ChatGPT are causing major issues

CSO Magazine

Phishing attacks are one of the most significant threats that organizations face today. As businesses increasingly rely on digital communication channels, cybercriminals exploit email, SMS, and voice communication vulnerabilities to launch sophisticated phishing attacks.