article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

Yes, one lapse on a spam email, one inadequate password, one abandoned account, or a malfunctioning asset can cause havoc. . Here is a rundown of the benefits of an asset management software in cutting down cyber-related threats. Identify assets and their associated risks. Handle the threats’ possible risks. .

article thumbnail

RiskLens Fast Facts on Cyber Risk in the Financial Industry

Security Boulevard

RiskLens is the leader in cyber risk quantification . Flagstar hasn’t made public the details of the attack, but let’s assume for analysis that the bank was hit with a system intrusion attack, in other words, code exploitation, brute force password guessing or other tactics that gave cyber criminals a foothold on the network.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

7 Insights About Managing Cyber Risk You Can’t Afford To Miss

Jane Frankland

trillion in global value will be at risk from cyberattacks. That could be through common hacking techniques like phishing, bait and switch, cookie theft, deep fake , password cracking , social engineering , and so on. Both share the same goal – to reduce risk – and both design, establish and enforce controls to protect an organisation.

article thumbnail

Eliminate the Password, Eliminate the Password Problem.

The Security Ledger

Weak, stolen or reused passwords are the root of 8 in 10 data breaches. Fixing the data breach problem means abandoning passwords for something more secure. Episode 163: Cyber Risk has a Dunning-Kruger Problem Also: Bad Password Habits start at Home. But what does passwordless authentication even look like?

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

article thumbnail

Cybersecurity Risk Quantification: A New Way to Understand Risks

Security Boulevard

Digital fraud and cybersecurity risks are always with us, and they’re constantly changing as businesses open new channels and adopt new technologies that criminals work to exploit. Data breaches are an especially thorny problem, with millions of customer records breached every year, and even password managers becoming vulnerable targets.

Risk 97
article thumbnail

How Do You Quantify Risk? Best Techniques

Centraleyes

Categorizing risks as high, medium, or low has been the go-to method for organizations seeking to prioritize their cybersecurity efforts. Ten Risks in a Bed Remember the nursery rhyme? Enter the need for a more precise and actionable approach — Cyber Risk Quantification. What is Cyber Risk Quantification?

Risk 52