September 2019
Cyber-Security Update

Be Aware of Cyber-Threats and Protect Your Organization from Critical Vulnerabilities and Harmful Attacks

The average cost of a malware attack on a company is $2.4 million and the average downtime of a malware attack is 50 days. This means more companies look to invest in a proper security strategy and keep themselves updated about new malware, ransomware, and other cyber-threats at all times. With our brand-new "Cyber-Threat Bulletin" SoftwareONE provides a monthly update on recent threats, the latest breaches, and how to respond to them.

Stay Ahead of Cyber-Threats with Our Brand-New Cyber-Threat Bulletin

We all enjoy the freedom and the benefits of a digitized world. Digital is dominating our eco-system and there are very few businesses out there without an online presence or cloud connection. While digitization offers a great value for enterprises it also opens up the door to cyber-security risks. It's crucial for every company to understand how to protect their assets and data from any kind of (virtual) intruder.

Did you know? Massive data fraud and theft and cyber-attacks were ranked fourth and fifth respectively by the World Economic Forum’s (WEF) Global Risk Report of 2019. Cyber-threats have been prevalent on the internet for decades now. The three most active cyber-threat categories worldwide are currently ransomware, phishing, and endpoint attacks.

Phishing attacks are hard to detect. They often appear to be everyday emails from known and trusted sources, but they trick users into installing malware on their devices, giving hackers access to their victims’ workstations to steal confidential user data.

We've all been there – receiving fraudulent email notifications asking for money or asking for our online banking passwords.

But guess what, although we have been trained on the danger of opening suspicious emails and not clicking on questionable links there are many other dangers hiding in the dark. In addition, criminals are evolving their tactics as well. Following a recent report of Avanan one out of 99 branded emails is a phishing note backed up with information from social media and copying renowned brands.

While the cloud has introduced new efficiencies and capabilities to the enterprise, the latest 'Cloud Security Threat Report' (CSTR) reveals that too many companies are not confronting the security risks that cloud adoption has introduced, including an increased risk of data breaches. Investment in cloud cyber-security platforms that leverage automation and AI to supplement visibility and overtaxed human resources is a clear way to automate defenses and enforce data governance principles.

Learn From Our Cyber-Security Experts: How to Protect Your Data From Any Harm

However, as the consequences of cyber-security become increasingly impactful to business success, it is also time to recalibrate workplace culture and adopt security best practices at a human level. To minimize the risk and impact of internal security breaches, our CISO & Cyber-Security team has developed our brand-new "Cyber-Threat Bulletin", which will highlight recent cyber-security breaches and provide insights on cyber-security awareness and cyber-threat intelligence. With this monthly service we will inform you about any new threats, security updates and how to implement secure mechanisms into your organization.

Prevention is key and starts with well-informed employees being aware of the latest threats and breaches. A well-planned security strategy is a good start or just the beginning and we are here to help you on your way.

Among the variety of most relevant news we’ve collected for you we’ll also discuss the data breach that happened at Capital One. A configuration vulnerability in Capital One’s infrastructure was compromised by the attacker to gain access to personal data. Approximately 106 million people were affected by this data breach with nearly 140,000 social security numbers and 80,000 bank details compromised. If you want to learn what actions your company should take to not be affected by a breach like this download your free copy of our September Cyber-Threat Bulletin here.

  • Tuesday 17 September 2019

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment

Author

Bala Sathunathan

Bala Sethunathan Director, Security Practice & CISO

Software Portfolio Management

Related Articles

unified communications
  • 03 October 2019
  • Dietmar Kraume
  • Managed Security, Unified Communications

Being Secure on the Super-Highway to Enterprise Collaboration

Unified communications (UC) has quickly become a staple of modern business culture, but it can bring Cyber-Security risks. Learn what these risks are, and how organizations can re-mediate them.

SQL 2008 end of support
  • 02 October 2019
  • Dan Ortman
  • Publisher Advisory, Managed Security

Top Considerations When Building Your Roadmap for SQL Server 2008 End of Support

SQL Server 2008’s end of support disrupted many organizations. Learn how to proceed with your upgrade process by building a comprehensive SQL EoS roadmap.

Proactive Configuration Management: The Key to Good Cybersecurity
  • 11 September 2019
  • Bala Sethunathan
  • Managed Security

Proactive Configuration Management: The Key to Good Cybersecurity

Prioritize and protect mission critical assets with the help of our security expert team to build a proper cybersecurity strategy