article thumbnail

Eliminate the Password, Eliminate the Password Problem.

The Security Ledger

Weak, stolen or reused passwords are the root of 8 in 10 data breaches. Fixing the data breach problem means abandoning passwords for something more secure. Episode 163: Cyber Risk has a Dunning-Kruger Problem Also: Bad Password Habits start at Home. But what does passwordless authentication even look like?

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

Yes, one lapse on a spam email, one inadequate password, one abandoned account, or a malfunctioning asset can cause havoc. . The IT division can rapidly categorize a new technology or software and approve it for usage by utilizing an ITAM platform. . ITAM simplifies asset protection without sacrificing simplicity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

7 Insights About Managing Cyber Risk You Can’t Afford To Miss

Jane Frankland

That could be through common hacking techniques like phishing, bait and switch, cookie theft, deep fake , password cracking , social engineering , and so on. Whilst managing cyber risk does require you to use risk management standards and frameworks, it’s not a case of using one over another. But know this.

article thumbnail

Episode 163: Cyber Risk has a Dunning-Kruger Problem also: Bad Password Habits start at Home

The Security Ledger

In this episode of Security Ledger Podcast (#163) sponsored by LastPass: companies are spending more than ever on cyber security, but feel less secure. Kevin Richards of the insurer Marsh joins us to talk about that company's Cyber Risk Perceptions Survey. Kevin Richards is the Global Lead for Cyber Risk Consulting at Marsh.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

article thumbnail

MY TAKE: Cyber attacks on industrial controls, operational technology have only just begun

The Last Watchdog

Monitoring and management of many existing industrial control systems’ (ICS) embedded devices, like pumps, valves and turbines, are ancient in technological terms. At the operational level, critical industrial sectors are dependent on technology developed 10 to 15 years ago and that aren’t regularly patched. Managing vulnerabilities.

article thumbnail

Episode 195: Cyber Monday Super Deals Carry Cyber Risk

The Security Ledger

The post Episode 195: Cyber Monday Super Deals Carry Cyber Risk appeared first. Read the whole entry. » » Related Stories TV Maker TCL Denies Back Door, Promises Better Process Security Holes Opened Back Door To TCL Android Smart TVs Episode 188: Crowdsourcing Surveillance with Flock Safety.