Business Email Hacking, Cyber Extortion, and Simplifying Zero-Trust One More Time

Share on linkedin
Share on twitter
Share on facebook

Have you ever felt like you are in the middle of a cyber storm? When a leak or a hack happens, it can feel like being in the center of a crazy cyber-nado, cyberricane, if you will. Sometimes it can feel a bit overwhelming just looking at the odds of a cyber event, even more so when it’s your business at stake. Here are a few ways to help you identify and stay away from the latest in the long line of cyber threat developments, at least for the moment. Constant vigilance is called for, when you work with cyber security!

 

 

Thanks again for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered biweekly on Tuesdays at 8PM ET.

Zero Trust, Maybe Then Zero Hacks?

 

Managed Service Providers Face Increased Cyber Threat From APT Groups via Security Magazine 

According to several cybersecurity agencies, state-sponsored advanced persistent threat (APT) groups and other malicious cyber actors are likely to increase their targeting of managed service providers (MSPs) against both provider and customer networks.

CISO Shares Top Strategies to Communicate Security’s Value to the Biz via DarkReading

In a keynote address at Black Hat Asia in Singapore this week, CISO and former NASA security engineer George Do discussed his go-to model for measuring security effectiveness – and getting others in the organization to listen.

Cyber Extortion Gets Personal– The Next Step in Email Compromises via Kroll 

What is the ‘next level’ of phishing? Experts have identified threat actors leveraging phishing attacks to gain access to key email and administrative level accounts, exfiltrate hundreds of GBs of data. They then initiate high-pressure extortion initiatives involving clients, colleagues, senior executives, and even family members.

Simplify Zero-trust Implementation For IoT Security via TechTarget

Zero-trust policies reduce the possibility of costly cyber attacks. Defining user access, boosting network security and using endpoint management tools can streamline adoption. Want better advice? Talk to Idenhaus for a personalized approach to ZTA.

Data Quality – Why You Can’t Ignore It Any Longer  via Idenhaus

What is bad data? How is it affecting your business? Find out how ignoring the bad data can make good data quality impossible to achieve. Want to know how to clean up your data? Stay tuned!

 

To receive the top Cybersecurity articles for Identity Management Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

Follow @Idenhaus on Twitter and subscribe to our YouTube channel.

By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.

Share on twitter
Share on linkedin
Share on facebook
Share on pocket
Share on email

Leave a Comment

Your email address will not be published.

About Idenhaus

Idenhaus is an award-winning Identity Management and Cybersecurity services firm based in Atlanta, GA.

Follow Us

Recent Posts

Newsletter Signup



top 25 iam blog idenhaus

Why You Need An IAM Roadmap

Scroll to Top