2020 Cybersecurity Landscape: 100+ Experts’ Predictions
Cyber Security Predictions 2021: Experts’ Responses
Experts’ Responses: Cyber Security Predictions 2023
Celebrating Data Privacy Day – 28th January 2023
Data Privacy Protection Day (Thursday 28th) – Experts Comments
Information Security Buzz (aka ISBuzz News) is an independent resource that provides the experts comments, analysis and opinion on the latest Information Security news and topics
<p>Every day we are confronted with news about another ransomware attack where the threat actor has infected an endpoint and moved laterally across the network, causing significant damage. The Diamond Comic Distributors cyber-attack is no exception, and a reminder to organisations the ease in which ransomware attacks can affect numerous markets worldwide. The American comic book distributor reported that the attack affected their ordering process and communications, which increased issues within their supply chain. <u></u><u></u></p><p><u></u> <u></u></p><p>It is essential that organisations invest in technology which protects every single endpoint on the network. If organisations <wbr />fail to secure their endpoints, then they will expose themselves to further cyber-attacks from ransomware gangs. <u></u><u></u></p><p><u></u> <u></u></p><p>Organisations must change their mindset from mitigating attacks to preventing them. Diamond Comics may have mitigated the impacts of the ransomware attack by not storing customer data and financial information, however both their supply chain and reputation have now been damaged.<u></u><u></u></p><p> <u></u><u></u></p><p>The best protection against attacks such as this one is a multi-layered approach using a variety of solutions. A “prevention-first” mindset is also key – attacks need to execute and run before they are picked up and checked to see if they are malicious, sometimes taking as long as 60 seconds or more. With deep learning <span lang=\"EN-US\">CISOs do not need to be superheroes. </span>This more complex approach is harder for criminals to crack, greatly reducing the risk of an attacker entering the network through a vulnerable endpoint.</p>