Remove Accountability Remove Energy and Utilities Remove Small Business
article thumbnail

Business ID Theft Soars Amid COVID Closures

Krebs on Security

Identity thieves who specialize in running up unauthorized lines of credit in the names of small businesses are having a field day with all of the closures and economic uncertainty wrought by the COVID-19 pandemic, KrebsOnSecurity has learned. But the same crime can be far more costly and damaging when thieves target small businesses.

article thumbnail

News alert: Beazley reports on how AI, new tech distract businesses as cyber risk intensifies

The Last Watchdog

IP theft has also become the cyber and technology risk for which businesses across the world feel least prepared, with more than one in four businesses (26%) reporting they feel ill-equipped to mitigate this risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Why consumers are destined to play a big role in securing the Internet of Things

The Last Watchdog

This will be led by the manufacturing, consumer, transportation and utilities sectors. One recent study demonstrated how, by analyzing readings from a smart home, such as energy consumption, carbon monoxide and carbon dioxide levels, and humidity changes, it was possible to triangulate what someone had for dinner. Talk more soon.

Internet 189
article thumbnail

Every month should be Cybersecurity Awareness Month!

CyberSecurity Insiders

Industries such as healthcare and energy and utilities are susceptible and arguably the most vulnerable to ransomware or other cybersecurity incidents. Small businesses, which previously felt they were too small to be of interest to criminals, are finding that they too are a target.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. Data is available on a number of RF protocols including Cellular, Bluetooth, Bluetooth Low Energy, Wi-Fi, and IEEE 802.15.4. Read more here. Read more here. Read more here.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

The next year is set to test global defences as these adversaries amplify their tactics, targeting critical infrastructure and small businesses, intensifying their use of advanced strategies. Critical infrastructure face heightened risk from targeted disruptions, as do small businesses who are the backbone of the economy.