SBS CyberSecurity - In The Wild 184

 

SBS Newsletter header

 

 

In The Wild - CyberSecurity Newsletter

Welcome to the 184th  issue of In The Wild, SBS' weekly CyberSecurity newsletter. The objective of this newsletter is to share threat intelligence, news articles that are relevant, new and updated guidance, and other information to help you make better cybersecurity decisions.

Below, you will find some of the latest-and-greatest news stories, articles, videos, and links from the past week in cybersecurity. Some of the following stories have been shared by consultants, others by the SBS Institute, and others yet simply been found in the far corners of the internet. We hope you find the following stories relevant, interesting, and – most of all – useful. Enjoy.

Follow SBS CyberSecurity on Social Media for more articles, stories, news, and resources!

         

[VIRTUAL CONFERENCE] CyberRiskNOW: ISO Edition

SBS Educational Resources

Wednesday, August 26, 2020 – 8:30AM – 4:00PM Central: This virtual conference is designed to provide interactive training on evolving cybersecurity threats and the responsibilities that an Information Security Officer (ISO or CISO) has to ensure the security of the organization, customer information, and people.  CyberRiskNOW: ISO Edition will cover the numerous operational and tactical responsibilities of an ISO, including IT Risk Assessment, Vendor Management, Business Impact Analysis/Business Continuity Management, Security Awareness, IT Audit oversight/remediation, and more.

Read Here »  

 

Why & Where You Should Plant Your Flag

Krebs on Security

Several stories here have highlighted the importance of creating accounts online tied to your various identity, financial and communications services before identity thieves do it for you. This post examines some of the key places where everyone should plant their virtual flags.

Read Here »  

How Executive Leaders Should Confront Ransomware

CEOWORLD

Recent high-profile ransomware attacks have seen victims succumb to the demands of attackers and pay the ransom. Any executive can sympathize with the urge to recover sensitive company data, and can probably understand the impulse to simply fold, hand over the ransom, and move on.

Read Here »  

What Is the Real Cost of a Data Breach?

CPO Magazine

There is a growing understanding across all types of organizations that the cost of data breaches often far exceeds the cost of preventive measures. However, there is still some fuzziness as to exactly what the total bill will be given various long-term effects that are hard to quantify.

Read Here »  

 

Do you know which SBS Institute Certification Programs are coming up? Check out the Certification Calendar and share with your clients. Find Out Here! »

 

The Best Password Managers to Secure Your Digital Life

Wired

PASSWORD MANAGERS are the vegetables of the internet. We know they're good for us, but most of us are happier snacking on the password equivalent of junk food. For seven years running that's been "123456" and "password"—the two most commonly used passwords on the web. The problem is, most of us don't know what makes a good password and aren't able to remember hundreds of them anyway.

Read Here »  

Microsoft tells Windows 10 users they can never uninstall Edge. Wait, what?

ZDNet

The new Edge is a very good browser. It's like Chrome --only better. But Microsoft has managed to annoy Windows 10 users by making Edge very difficult to ignore.

Read Here »  

The Week in Ransomware - August 14th 2020 - Crime made easy

Bleeping Computer

Ransomware continues its siege on organizations worldwide, with new variants released every day and attacks continuing to be reported. The biggest news this week is the information about a hacking toolkit that makes it easy for inexperienced hackers to compromise a network and deploy a ransom.

Read Here »  

5 Leadership Styles for the Workplace

U.S. News

What determines the success or failure of a company often comes down to the effectiveness of its leadership. Yet every leader leverages their own leadership style to try to achieve the best results. Review the list below to see some of the most common types of leadership, and learn how you can apply each of the following leadership styles in management at work.

Read Here »

10 Other Interesting Links From This Week

There were too many fantastic reads from this past weeks' worth of cybersecurity and technology news, so here are a few additional quick-hit links for your reading pleasure:

*     Krebs on Security: Microsoft Patch Tuesday, August 2020 Edition

*     Krebs on Security: Medical Debt Collection Firm R1 RCM Hit in Ransomware Attack

*     Bleeping Computer: U.S. spirits and wine giant hit by cyberattack, 1TB of data stolen

*     Bleeping Computer: Windows 10 features that boost your computer's security

*     Bleeping Computer: Business technology giant Konica Minolta hit by new ransomware

*     The Hacker News: Amazon Alexa Bugs Allowed Hackers to Install Malicious Skills Remotely

*     ZDNet: A simple telephony honeypot received 1.5 million robocalls across 11 months

*     SC Media: More attackers trying to sabotage incident response tactics

*     CyberScoop: TikTok users 'voluntarily' giving their data to China, Justice official says

*     CISA: Malicious Cyber Actor Spoofing COVID-19 Loan Relief Webpage via Phishing Emails

Comments

Popular posts from this blog

Krebs - NY Charges First American Financial for Massive Data Leak

KnowBe4 - Scam Of The Week: "When Users Add Their Names to a Wall of Shame"