September 2019
Cyber-Security Update

Be Aware of Cyber-Threats and Protect Your Organization from Critical Vulnerabilities and Harmful Attacks

  • Bala Sethunathan
  • Cyber-Security Updates, Managed Security
  • Security, Cyber-Security

The average cost of a malware attack on a company is $2.4 million and the average downtime of a malware attack is 50 days. This means more companies look to invest in a proper security strategy and keep themselves updated about new malware, ransomware, and other cyber-threats at all times. With our brand-new "Cyber-Threat Bulletin" SoftwareONE provides a monthly update on recent threats, the latest breaches, and how to respond to them.

Stay Ahead of Cyber-Threats with Our Brand-New Cyber-Threat Bulletin

We all enjoy the freedom and the benefits of a digitized world. Digital is dominating our eco-system and there are very few businesses out there without an online presence or cloud connection. While digitization offers a great value for enterprises it also opens up the door to cyber-security risks. It's crucial for every company to understand how to protect their assets and data from any kind of (virtual) intruder.

Did you know? Massive data fraud and theft and cyber-attacks were ranked fourth and fifth respectively by the World Economic Forum’s (WEF) Global Risk Report of 2019. Cyber-threats have been prevalent on the internet for decades now. The three most active cyber-threat categories worldwide are currently ransomware, phishing, and endpoint attacks.

Phishing attacks are hard to detect. They often appear to be everyday emails from known and trusted sources, but they trick users into installing malware on their devices, giving hackers access to their victims’ workstations to steal confidential user data.

We've all been there – receiving fraudulent email notifications asking for money or asking for our online banking passwords.

But guess what, although we have been trained on the danger of opening suspicious emails and not clicking on questionable links there are many other dangers hiding in the dark. In addition, criminals are evolving their tactics as well. Following a recent report of Avanan one out of 99 branded emails is a phishing note backed up with information from social media and copying renowned brands.

While the cloud has introduced new efficiencies and capabilities to the enterprise, the latest 'Cloud Security Threat Report' (CSTR) reveals that too many companies are not confronting the security risks that cloud adoption has introduced, including an increased risk of data breaches. Investment in cloud cyber-security platforms that leverage automation and AI to supplement visibility and overtaxed human resources is a clear way to automate defenses and enforce data governance principles.

Learn From Our Cyber-Security Experts: How to Protect Your Data From Any Harm

However, as the consequences of cyber-security become increasingly impactful to business success, it is also time to recalibrate workplace culture and adopt security best practices at a human level. To minimize the risk and impact of internal security breaches, our CISO & Cyber-Security team has developed our brand-new "Cyber-Threat Bulletin", which will highlight recent cyber-security breaches and provide insights on cyber-security awareness and cyber-threat intelligence. With this monthly service we will inform you about any new threats, security updates and how to implement secure mechanisms into your organization.

Prevention is key and starts with well-informed employees being aware of the latest threats and breaches. A well-planned security strategy is a good start or just the beginning and we are here to help you on your way.

Among the variety of most relevant news we’ve collected for you we’ll also discuss the data breach that happened at Capital One. A configuration vulnerability in Capital One’s infrastructure was compromised by the attacker to gain access to personal data. Approximately 106 million people were affected by this data breach with nearly 140,000 social security numbers and 80,000 bank details compromised. If you want to learn what actions your company should take to not be affected by a breach like this download your free copy of our September Cyber-Threat Bulletin here.

  • Tuesday 17 September 2019

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment

Author

Bala Sathunathan

Bala Sethunathan Director, Security Practice & CISO

Software Portfolio Management

Related Articles

SoftwareONE Cyber Security Update 2019-10
  • 15 October 2019
  • Bala Sethunathan
  • Cyber-Security Updates, Managed Security
  • Cyber-Security, Security

Cyber Security Updates – October 2019

Criminal cyber-activities come with only one goal: to attack your systems and to leave you with financial damages and reputational loss. In our October edition, we will cover latest data breaches such as a ransomware attack on several U.S.…

managed-security-teaser
  • 10 October 2019
  • Bala Sethunathan
  • Managed Security
  • Strategy, How-To

Building an Effective Security Operations Center (SOC) at Your Organization

Many organizations simply do not have the resources and expertise available to build an effective in-house security operations center (SOC). Let’s take a look at how you can put together an SOC that can be maintained for years to come.

unified communications
  • 03 October 2019
  • Dietmar Kraume
  • Managed Security, Unified Communications
  • Cyber-Security, EnterpriseVoice, Cyber-Threats

Being Secure on the Super-Highway to Enterprise Collaboration

Unified communications (UC) has quickly become a staple of modern business culture, but it can bring Cyber-Security risks. Learn what these risks are, and how organizations can re-mediate them.