The Future of Cyber Security is all-in-one

F-Secure’s 2020 market survey found that companies have an average of 3.3 different cyber security brands in use at one time. For larger companies this figure is likely a very conservative estimate. At the same time, 82% of companies surveyed said they wanted an all-in-one cyber security solution. There is a clear mismatch here and part of the problem is that all-in-one security is hard to do, and even harder to do well.

Phishing – facts and statistics

Phishing is an ever-prevalent cyber threat that can affect anyone who utilizes some form of digital communication – effectively everyone using mobile phones and/or computers in today’s world.

Furthermore, dealing with the threat of phishing is no longer the sole responsibility of IT Security teams but now also the responsibility of all end-users who need to prevent falling prey to these schemes.

Solid mix of Cyber Security technologies prevent MS Exchange data breaches

The group of Microsoft Exchange vulnerabilities known as ProxyLogon has affected tens of thousands of companies with on-premise, internet-exposed Exchange servers. Even though Microsoft has announced that the majority of vulnerable servers are now patched, experts have warned that merely patching the vulnerabilities is not enough: Threat actors who have already gained access to servers could still be in the network.

Webinar Replay – CISOs step up on Cloud & Cyber priorities for 2022

Pandemic pressures have put CISOs in the spotlight – and helping them transform organizations’ attitudes to cybersecurity. Building on F-Secure’s survey of security leaders published earlier this year, they asked the CISOs for Better.com and Pepper Group to discuss how they dealt with rapid change.

Workshops on Attack Detection Fundamentals 2021

Watch the second series of workshops, focusing on the basics of detection across technologies including Windows, macOS, AWS, and Azure. The consultants provide hands-on demonstrations and lab walkthroughs that you can start using straight away. These sessions will improve how you use detection techniques in your existing enterprise stack and give you a broader understanding of attacker techniques against the various technologies.

Be sure to consider some of the cyber threats out there and consider these tips for protecting yourself and your devices. Until our next mailer, you can check out all the great resources we have available on our website.

The Cybervision Team