article thumbnail

Duo’s Data-Driven Defense: Combatting Cyber Threats in Higher Education

Duo's Security Blog

Duo has a long history of protecting students across universities and higher education institutions. Because Duo has such a large presence in the world of education, we can also spot trends in attack tactics and learn how to better secure your organization. But the importance of secure policies should not be ignored.

Education 107
article thumbnail

GUEST ESSAY: Leveraging DevSecOps to quell cyber risks in a teeming threat landscape

The Last Watchdog

In today’s digital landscape, organizations face numerous challenges when it comes to mitigating cyber risks. Here are some of the key challenges that organizations encounter in their efforts to mitigate cyber risks in the current environment. Lack of security awareness and education.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Identity Threat Trends for Higher Education

Duo's Security Blog

As a new semester begins, we at Cisco Duo want to share some findings and trends pertaining to threat activity we have seen across higher education customers. In this situation, we can assume that they have either phished users’ first factor credentials (their password), or are crawling user accounts with weak, guessable passwords.

Education 122
article thumbnail

GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted

The Last Watchdog

One critical issue faced by organizations that rely on Exchange Server is the risk of a corrupt Exchange Server database cropping up. Navigating new risks Today, heavy reliance on cloud-centric IT infrastructure and cloud-hosted applications has become the norm. Here are a few ‘dos:’ •Rigorous vulnerability management.

Risk 264
article thumbnail

2023 Phishing Report Reveals 47.2% Surge in Phishing Attacks Last Year

Security Boulevard

Phishing attacks continue to be one of the most significant threats facing organizations today. As businesses increasingly rely on digital communication channels, cybercriminals exploit vulnerabilities in email, SMS, and voice communications to launch sophisticated phishing attacks.

Phishing 120
article thumbnail

“My Slice”, an Italian adaptive phishing campaign

Security Affairs

Adaptive phishing campaigns are emerging as an increasingly sophisticated threat in the cybersecurity landscape. The phenomenon This phenomenon represents an evolution of traditional phishing tactics, as attackers seek to overcome defenses using more personalized and targeted approaches.

Phishing 108
article thumbnail

North Dakota Approves K-12 Cybersecurity Education Bill

SecureWorld News

Cybersecurity education is a central component of landmark House Bill 1398 , signed into law by Governor Doug Burnum and expected to garner final approval July 1, 2024. Burnum said, while addressing the cybersecurity education legislation at the bill signing ceremony. North Dakota is the first state in the U.S.