cyber security Archives – Page 2 of 2 – Musato Technologies
loader image

We enable business and digital transformation decisions through the delivery of cutting-edge ICT solutions and products...





Get inspired…
  
  
  

cyber security

Phishing and spearphishing are threats to your business 

While security professionals focus largely on identifying and patching vulnerabilities in software, the weakest security link typically ends users. Phishing is a social engineering method to fraudulently obtain information by disguising… Continue reading

SMB security Policies to protect your business

Small and midsize businesses are increasingly being targeted by cybercriminals—but they often lack the resources and expertise to develop comprehensive security policies to help defend against threats.- SMB security Policies

This set… Continue reading

Cloud-based security for a faster performing website

Cyber threats are becoming more sophisticated with each passing year. As bad actors discover new methods to uncover security vulnerabilities, corporate countermeasures need to stay one… Continue reading

Application security is more important than ever

The security of business applications is often overlooked, despite the fact that exploitation of vulnerabilities in software is one of the key attack methods of cyber criminals and that application breaches… Continue reading

EU General Data Protection Regulation (GDPR)

Through the power of information technology, any enterprise that sells products or provides services via the internet is technically a global business. Regardless of whether your organization is a one-person operation … Continue reading

The rising threat of fileless malware

Threat actors are increasing their use of fileless malware for one simple reason: most organizations aren’t prepared to detect it. Education is the first step in determining what threat these new attacks pose and what you can do to detect and stop fileless malware attacks.

Fileless Malware

Fileless malware is a significant and increasing threat. While awareness of that fact is growing, there’s still confusion among security practitioners and vendors about the nature of the threat and the requirements for a successful defense strategy.

Part of that confusion is because of most of the security methods, solutions and routines used to detect and prevent cyber security threats remain firmly grounded in addressing file-based attacks. As with any new type of cyber threat, many security-focused professionals need a point of reference, or newsworthy attack, as their driver for altering, updating or replacing their current security workflows.

The goal of every security organization is not to be the first victim of that attack.

A recent survey by Ponemon, the 2017 State of Endpoint Security Risk, showed that fileless attacks rose, as a percent of all malware attacks, from 20% in 2016 to 29% in 2017. It estimated that in 2018, fileless attacks would rise to 35%. Of the 54% of respondents that indicated they were compromised by at least one attack, 77% said those successful
breaches were from fileless attacks. Continue reading

Cyber-security is a business necessity

Cyber-security is no longer optional, with 51% of companies have experienced some form of cyber attack, said Wlodzimierz Nowak, chief security, legal and compliance officer at T-Mobile Poland.Cyber-security

Statistics show that 93% of all large enterprises were targeted by cyber attacks in 2016 alone. “But cyber-security has become a complex issue as business has embraced the internet, cloud, and mobile working,” he told the CyberSec European Cyber Security Forum in Krakow.

In developing a cybersecurity strategy, Nowak said organizations need to understand the most common aims of any cyber attack.

These are to stop the flow of data, to disturb the flow of data; modify data; steal data; or discredit the targeted organization, in the public and private sector, including governments.

An important element of cybersecurity, said Nowak, is to ensure that enterprises, governments, and individuals all do their share in terms of keeping cyberspace secure.

“Just like someone who is infected with a virus can pass that on to someone else, any entity not following cybersecurity best practices can create vulnerabilities for others in the cyber community,” he said. Continue reading

Typically, your spam folder catches a lot of the malware-infected crud sent by the mischievous ne’er-do-wells from Email Addresses Exposedthe darker corners of the internet. Unfortunately, a newly discovered attack has targeted more than 711 million email accounts.Fortunately, only some — not all — of the targets’ passwords have been taken.

The Onliner spambot, first discovered by a Paris-based security researcher who goes by the Benkow pseudonym, was confirmed by well-regarded security expert Troy Hunt in an August 30 blog post. Hunt — a Microsoft Regional Director who runs the breach-tracking website Have I Been Pwned — referred to a data dump from Onliner as “a mind-boggling amount of data,” in which he even found his own email address. Continue reading