article thumbnail

10 Holiday Cybersecurity Tips for CISOs

Security Boulevard

Chief information security officers (CISOs) should proactively implement strategies and protect their infrastructures against hacking months and weeks leading up to this busy time of the year.  Top holiday cybersecurity tips for CISOs With so many things going on, where should you focus your resources?

CISO 69
article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 4/7

Security Boulevard

AF steals your Gmail contents from an initial spear phishing attack. It’s why we have robust data backup and recovery strategies. The post Cybersecurity Insights with Contrast CISO David Lindner | 4/7 appeared first on Security Boulevard. Insight #1 " A malicious browser extension, AF, was detected this past week.

CISO 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

CISOs will have to get quantum resilient encryption on their cyber roadmap. Nick Mistry , SVP, CISO, Lineaje Mistry The software landscape is poised for significant changes, with a growing emphasis on Software Bill of Materials (SBOM.) In 2024 I encourage leadership to dedicate more attention to discussing the risks of spear phishing.

article thumbnail

The Era of Ransomware: How to Respond in a Crisis

CyberSecurity Insiders

One of the top cyber threats currently affecting companies is called ‘phishing’, in which a threat actor poses as a legitimate business colleague but follows up with a ransomware attack. Step 3: Use backup and disaster recovery (BDR) software to restore systems and data from backups taken before the network was infected by ransomware.

article thumbnail

Cost-Effective Steps the Healthcare Industry Can Take To Mitigate Damaging Ransomware Attacks

CyberSecurity Insiders

More than half of the breaches started with the network servers being compromised either through email phishing, malware or privileged credential misuse. A solid cybersecurity posture is only as strong as its policies, backups and disaster plans. million patients. Implement Threat Awareness Training.

article thumbnail

Healthcare Cyberattacks Lead to Increased Mortality, Lower Patient Care: Ponemon Study

eSecurity Planet

The most common types of attacks were cloud compromise, ransomware, supply chain , and business email compromise (BEC)/ spoofing / phishing. Ponemon and Proofpoint held a briefing yesterday to preview the report, joined by two healthcare CISOs: Hussein Syed of RWJBarnabas Health and Dan Anderson of LifeScan Global.

article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

Nowadays, organisations need digital leaders such as CIOs, CISOs, and CTOs who are strategists, visionaries, and know how to manage, effectively. Pre pandemic, Nominet released a study, Life Inside the Perimeter: Understanding the Modern CISO and reported on cybersecurity’s leaders. billion) is expected online.

CISO 130