article thumbnail

BrandPost: Everything SMBs Need to Know About Ransomware in 2021

CSO Magazine

Ransomware attacks on large enterprises like Colonial Pipeline dominate the headlines. But did you know small and medium-size businesses (SMBs) account for at least half of all ransomware attacks, if not closer to two-thirds, according to the U.S. 1 In fact, ransomware is the most common cyberthreat that SMBs face. What it is.

article thumbnail

BrandPost: Tips for building and maintaining a cyber-readiness framework

CSO Magazine

The cyber threat landscape is constantly evolving, with familiar attack tactics like ransomware , phishing, and credential abuse and theft becoming more sophisticated and destructive. Now more than ever, it’s essential for companies to have a cyber response framework in place long before an attack happens.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What does the Colonial Pipeline attack tell us about security today?

IT Security Guru

In May the US Colonial Pipeline shut its operational network after a ransomware cyber-attack. The first relates to reports that there was no Chief Security Officer (CSO) in place. The first relates to reports that there was no Chief Security Officer (CSO) in place. It’s said to be one of the costliest attacks for an economy.

article thumbnail

Spotlight Podcast: Taking a Risk-Based Approach to Election Security

The Security Ledger

» Related Stories Spotlight Podcast: QOMPLX CISO Andy Jaquith on COVID, Ransomware and Resilience Spotlight Podcast: RSA President Rohit Ghai warns Digital Transformation is magnifying Enterprise Risk Ahead of Black Hat: Fear and Pessimism in Las Vegas. Also joining us: Sam Curry, the CSO of Cybereason.

Risk 52
article thumbnail

Q&A: Researchers find evidence of emerging market for stolen, spoofed machine identities

The Last Watchdog

Hudson: You can somebody to click on a website, using a falsified machine identity, and then download them some ransomware, or put keystroke stealer, or any kind of information harvesting malware. At the end of the day the CSO the CIO and the CEO all left the company. LW: Can you walk us through an example?

Marketing 133