31 Mar Cybersecurity Weekly: 3.31.23
This week’s top picks in Cybersecurity-focused news coverage…
Top 50 Most Impersonated Brands By Phishing URLs
“By masquerading as a reputable source – sometimes with an enticing request, other times with a severe consequence – an attacker lures in the victim in order to trick them, similarly to how a fisherman uses bait to catch a fish.” READ MORE
Over 70% Of Employees Keep Work Passwords On Personal Devices
“With the widespread use of personal mobile devices in the workplace, it is increasingly difficult for employers to ensure the security of sensitive information…In 2022, we saw that the use of personal devices and personal apps was the direct cause of many high-profile corporate breaches. This is a trend that will surely continue, as employees often use corporate and personal devices for work, effectively doubling the attack surface for cyber-criminals.” READ MORE
Gartner Publishes Top Eight Cybersecurity Predictions
“According to Gartner, by 2027, 50% of CISOs will have formally adopted human-centric design practices. This involves security design modelled with the individual, rather than the technology, threat or location, as the main focus.” READ MORE
ChatGPT Data Breach Confirmed As Security Firm Warns of Vulnerable Component Exploitation
“According to OpenAI’s investigation, the titles of active users’ chat history and the first message of a newly created conversation were exposed in the data breach. The bug also exposed payment-related information belonging to 1.2% of ChatGPT Plus subscribers, including first and last name, email address, payment address, payment card expiration date, and the last four digits of the customer’s card number.” READ MORE
Increasing Data Security Risks and Device Replacement Costs Driving Adoption of Cloud Computing Solutions Across Industries
“Instead of every employee’s laptop or PC individually storing company files and information, cloud computing moves all data storage and processing to a secure, centralized server, making it much more difficult for bad actors to gain access to sensitive data. The endpoint devices essentially serve as controllers to access the central server, with the device’s display showing a live “image” delivered by the server without any data actually being sent to the device.” READ MORE
—
ABOUT ALTOURAGE
Altourage is a client-obsessed managed service provider. We offer Support Services, Cybersecurity Solutions, Cloud & Infrastructure Management and Business Transformation Consulting to trailblazing companies in the ‘High Trust’ sectors, including Financial Services, Professional Services, Tech Startup and Nonprofit. Our highest purpose is creating true partnerships with our clients. To do so, we purposefully select dedicated teams of engineers, project managers, help desk analysts, and client success professionals that become a true extension of our clients’ organizations. VISIT: WWW.ALTOURAGE.COM
ALTOURAGE ON CYBERSECURITY
Few areas in the information technology space draw as much focus and concern as cybersecurity, and rightly so. Threats that were once the concern of governments and enterprises now frequently target small and midsized business. In addition, cybersecurity requirements from clients, partners, investors, insurers, and regulators continue to grow.
Our cybersecurity team delivers complete protection across endpoints, servers, networks and cloud platforms. Employing industry-leading next-gen firewalls and antivirus protection, intelligent web filtering, data-loss prevention tools, threat intelligence, and training and testing tools, our NIST-based, data-centric approach to cybersecurity ensures your people, data, and customers remain as safe as possible.
To learn more about how we can help your company develop and execute a comprehensive cybersecurity strategy, reach out to us Contact us today: https://altourage.com/contact/