September 2019
Cyber-Security Update

Be Aware of Cyber-Threats and Protect Your Organization from Critical Vulnerabilities and Harmful Attacks

The average cost of a malware attack on a company is $2.4 million and the average downtime of a malware attack is 50 days. This means more companies look to invest in a proper security strategy and keep themselves updated about new malware, ransomware, and other cyber-threats at all times. With our brand-new "Cyber-Threat Bulletin" SoftwareONE provides a monthly update on recent threats, the latest breaches, and how to respond to them.

Stay Ahead of Cyber-Threats with Our Brand-New Cyber-Threat Bulletin

We all enjoy the freedom and the benefits of a digitized world. Digital is dominating our eco-system and there are very few businesses out there without an online presence or cloud connection. While digitization offers a great value for enterprises it also opens up the door to cyber-security risks. It's crucial for every company to understand how to protect their assets and data from any kind of (virtual) intruder.

Did you know? Massive data fraud and theft and cyber-attacks were ranked fourth and fifth respectively by the World Economic Forum’s (WEF) Global Risk Report of 2019. Cyber-threats have been prevalent on the internet for decades now. The three most active cyber-threat categories worldwide are currently ransomware, phishing, and endpoint attacks.

Phishing attacks are hard to detect. They often appear to be everyday emails from known and trusted sources, but they trick users into installing malware on their devices, giving hackers access to their victims’ workstations to steal confidential user data.

We've all been there – receiving fraudulent email notifications asking for money or asking for our online banking passwords.

But guess what, although we have been trained on the danger of opening suspicious emails and not clicking on questionable links there are many other dangers hiding in the dark. In addition, criminals are evolving their tactics as well. Following a recent report of Avanan one out of 99 branded emails is a phishing note backed up with information from social media and copying renowned brands.

While the cloud has introduced new efficiencies and capabilities to the enterprise, the latest 'Cloud Security Threat Report' (CSTR) reveals that too many companies are not confronting the security risks that cloud adoption has introduced, including an increased risk of data breaches. Investment in cloud cyber-security platforms that leverage automation and AI to supplement visibility and overtaxed human resources is a clear way to automate defenses and enforce data governance principles.

Learn From Our Cyber-Security Experts: How to Protect Your Data From Any Harm

However, as the consequences of cyber-security become increasingly impactful to business success, it is also time to recalibrate workplace culture and adopt security best practices at a human level. To minimize the risk and impact of internal security breaches, our CISO & Cyber-Security team has developed our brand-new "Cyber-Threat Bulletin", which will highlight recent cyber-security breaches and provide insights on cyber-security awareness and cyber-threat intelligence. With this monthly service we will inform you about any new threats, security updates and how to implement secure mechanisms into your organization.

Prevention is key and starts with well-informed employees being aware of the latest threats and breaches. A well-planned security strategy is a good start or just the beginning and we are here to help you on your way.

Among the variety of most relevant news we’ve collected for you we’ll also discuss the data breach that happened at Capital One. A configuration vulnerability in Capital One’s infrastructure was compromised by the attacker to gain access to personal data. Approximately 106 million people were affected by this data breach with nearly 140,000 social security numbers and 80,000 bank details compromised. If you want to learn what actions your company should take to not be affected by a breach like this download your free copy of our September Cyber-Threat Bulletin here.

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment

Author

Bala Sathunathan

Bala Sethunathan Director, Security Practice & CISO

Software Portfolio Management

Related Articles

Be Prepared: Security Trends To Watch Out for in 2020

5 Key Strategies for Creating a Cyber Awareness Program

A strong cyber-security posture goes well beyond the security team. Let’s take a closer look at the five key strategies for creating a cyber awareness program.

How To Fix Sh(adow) IT

SH(adow) IT Happens – How can I fix it?

Left unmanaged, Shadow IT can expose organizations to financial, security, and compliance risks. Here’s how to discover and manage your software environment.

microsoft 365

The Key Drivers to Moving to Microsoft 365 Today

Microsoft 365 is an excellent option for businesses and enterprises alike - but do you know why? Learn more about the key drivers for M365 migration.