SoftwareONE Cyber Security Updates - November 2019

November
Cyber Security Update

Cyber Security Update - November 2019

SoftwareONE believes there is a need for a breakthrough in cybersecurity. We believe that more companies should invest in a proper security strategy and keep themselves updated about new malware, ransomware, and other threats at any time. With our brand-new Cyber Threat Bulletin SoftwareONE provides a monthly update on recent threats, the latest breaches, and how to react to them.

Stay Ahead Of Cyber Threats: New Cyber Threat Bulletin

Are you a bargain hunter? Then the 29th of November is probably circled in red on your calendar. Black Friday is unquestionably one of the most important retail days of the year – followed closely by Cyber Monday - to watch out for special offerings and big discounts. However, despite all the good deals calling out to you, make sure to check each deal carefully. Not every offering is a real bargain and especially when shopping online cyber-criminals have become very creative in collecting sensitive data such as your name, contact details and credit card information to sell them to third-party vendors in the darknet. Fake websites that query all these data for purchase are just the tip of the iceberg. Even if you feel proficient it can still be difficult to differentiate between a company website and its deceptively genuine copy. Not only consumers are affected by cyber-attacks. Companies are also facing significantly rising security incidents. Moreover, these attacks can often run for a long time, hidden in an organization’s own network without being detected.

This is what recently happened to a Primary Health Organization (PHO) in New Zealand. On August 5, PHO Tū Ora Compass Health reported a cyber-attack to the authorities in New Zealand. All servers were taken offline and as soon as a data breach became certain, an official investigation started. That investigation revealed previous cyber-attacks that already started in 2016 and went on until March 2019. At Tū Ora Compass Health that provides essential primary healthcare coverage in New Zealand determined this data breach could have exposed medical data affecting up to 1 million people. We could also add other incidents to this list – such as Yahoo who faced several cyber-attacks for a period of 4 years which affected about 3 billion people.

There are myriad tools cyber-criminals use to break into an enterprise security system. These attacks often aim at damaging the reputation of an organization, causing financial loss and even causing damage to an entire industry. Once the damage is done it requires solid investment into a more secure infrastructure but most importantly, much more time to build up trust and confidence again. Preventative, professional and swift emergency expertise is crucial.

Plan Your Security Strategy with Inside Information and Action Items on the Latest Threats and Breaches

Prevention is the key and starts with well-informed employees knowing about the latest threats and breaches. A well-planned security strategy is just the beginning and we are here to help you on your way.

Get Your Cyber Threat Bulletin

Join us this month and read our latest Cyber Threat Bulletin to find out more about the latest cyber-threats, attacks, and harm and how to prevent them from happening to your company.

Download our November edition and be well-informed with key information and a list of activities to help you close security gaps.

  • Wednesday 20 November 2019

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment

Author

Bala Sathunathan

Bala Sethunathan Director, Security Practice & CISO

Software Portfolio Management

Related Articles

Security in the cloud

An Initial Introduction to Security in the Cloud

Whichever cloud solution or platform you choose, they should provide you with security that is perfectly tailored to your organization. Let’s discuss how your Cloud security could look like.

Shadow IT Happens - Read Why

SH(adow) IT Happens – But Why?

Shadow IT is caused by programs that are not approved by the IT department and can leave organizations open to potentially damaging security, compliance, and financial risks.

Data Protection

Why Data Protection Should Be Your Daily Routine

The risk of being attacked is nearly everywhere. With our monthly Cyber Threat Bulletin you’ll never miss out on how to protect yourself from new malware, ransomware, and other threats again.