Most Popular Cybersecurity Blog Posts from 2019

2019 was quite a year in cyberspace. As highlighted last month in my year-end top story blog, the top cybersecurity theme was all about the ways that ransomware targeted state and local governments and hospitals. In fact, we are still learning about some 2019 government ransomware impacts, like this story from Albany County, N.Y., over Christmas break.   

Also, data breaches were up more than 33 percent in 2019, when compared with 2018, according to Risk Based Security.

So readers always ask: What were the most popular Lohrmann on Cybersecurity & Infrastructure blogs in the past year?

We crunch the numbers every January, and offer you the opportunity to go back and focus in on the topics that others are reading and spending their time on or have special significance.

Overall, blog page views are up 25% percent over 2018, which is no surprise.

Top 10 Blog Posts First Published in 2019

  1. The Top 20 Security Predictions for 2020Whether you call them cybersecurity forecasts, online risk trends or security predictions, here’s a roundup of what our top security companies, industry experts and tech magazines are saying about the year (and decade) ahead. How can you prepare for 2020?
  2. CISO Expectations Are Becoming Impossible to Achieve — The multi-year rise in data breaches, ransomware attacks and insider threats has led to a surging global need for cybersecurity leaders to save the day. But here’s why the CISO ideal is harder than ever to deliver.
  3. Ransomware Attacks Becoming More Widespread, Destructive, ExpensiveAfter more destructive attacks globally against critical infrastructure, the stakes are growing for the public and private sector regarding ransomware. Let’s explore the latest malware, including LockerGoga.
  4. An Inside Look at New York State Government CybersecurityAs part of its enterprise IT transformation, New (Read more...)

*** This is a Security Bloggers Network syndicated blog from Lohrmann on Cybersecurity authored by Lohrmann on Cybersecurity. Read the original post at: