Cybersecurity for Dummies Part 1: Making Cybersecurity Everyone’s Responsibility

In our always-connected world where the private information of individuals and organizations is vulnerable to exposure and misuse, cybersecurity is everyone’s responsibility because hackers or malicious threat actors who steal proprietary information don’t care about age, gender, race, culture, beliefs, or nationality. They probe your digital footprint and your Internet-connected computers based on opportunity, often…
Read more

Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template?

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy? Let’s get the easy part out of the way: if your organization has its…
Read more

The Land of the Free just lost one of its most important freedoms: The Freedom of the Internet

Net Neutrality, just like privacy, is gone in the U.S.  For many citizens net neutrality is something that either seems confusing, or is lost in translation. ISPs now have full control over what content you see on the internet Basically, what has happened is that the FCC have handed control of internet services and content…
Read more

PAM Risk Assessment: your first step to better privileged access control

These days Privileged Access Management and Privileged Account Management (PAM) are interchangeable terms that get a lot of attention. There’s a reason why PAM is fast becoming a top-of-mind cybersecurity issue:  up to 80% of cybersecurity breaches are associated with the abuse or misuse of privileged account credentials. And these credentials readily give hackers or…
Read more

How Do I Protect Against Ransomware?

Guest column by Joseph Carson, Chief Security Scientist at Thycotic. “Ransomware” is on the rise using “targeted phishing attacks” and is being used for financial blackmail and poison or corrupt data. No one is excluded from these threats and no company or individual is too small to be a target. Ransomware has become such a … Continue reading How Do I Protect Against Ransomware? → The post How Do I Protect Against Ransomware? appeared first on Semperis.
Read more
Page 1 of 212