Reasons To Be Thankful for Cybersecurity, Part One

This week, we revisit the reasons behind phishing, and some of the newest phishing stories to break. Want to learn more about how to keep from being a victim? In a few words: vigilance, planning, and updates updates updates.

Thanks for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view the healthcare-focused digest.

Peruse our resources for webinarscase studies, infographics, and educational videos. Subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM digest, delivered biweekly on Tuesdays at 8PM ET.

Reading for Cybersecurity Professionals

 

‘Groundbreaking’ CISA Directive to Overhaul Cyber Vulnerability Management Process

A new CISA directive is “groundbreaking in that for the first time, this is really giving timelines to remediate those specific vulnerabilities that we know have been actively exploited by adversaries,” says CISA Director Jen Easterly

Proofpoint Phish Harvests Microsoft O365, Google Logins

Phishers are impersonating Proofpoint, the cybersecurity firm, in an attempt to make off with victims’ Microsoft Office 365 and Google email credentials. The email lure was a file purportedly linked to mortgage payments. Always be vigilant!

Justice Department Conducting Cyber Crackdown

The Justice Department is stepping up actions to combat ransomware and cybercrime through arrests and other actions, according to Deputy Attorney General Lisa Monaco. Read the full interview here.

How Cyber Thieves Are Ramping Up Their Phishing Attacks Against Companies And Organizations

Cyber thieves are using new strategies, tactics and techniques to help increase the chances of success of their phishing attacks against companies and organizations, while also increasing the amount of ransom demanded. The fun is just getting started…

IAM Best Practices: Initial Population Of ID Stores

Identity Management solutions are intended to help make life easier, not more difficult. However, when not properly implemented, solutions that are designed to help can seem more like a hindrance. Today we talk best practices for ID stores, a basic component of a good overall IAM solution.

Check out our previous digest of articles for Identity Management Professionals, November Reading for IAM Professionals.

To receive the top Cybersecurity articles for Identity Management Professionals in your inbox every two weeks (Tuesdays 8 PM EST), subscribe to our Identity Management biweekly and/or our Healthcare Cybersecurity and IAM Digest.

Follow @Idenhaus on Twitter and subscribe to our YouTube channel.



By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top