07 Jun Cybersecurity Weekly 6.7.22
Apple Demos Safari’s ‘Passkeys’ Support in MacOS Ventura That Will Help Bring an End to Passwords
“By avoiding the use of passwords entirely, they should prevent users from falling victim to phishing attacks, social engineering, or bot attacks that plug in passwords snagged from databases of leaked passwords. Instead, you can use a device (like your phone or computer) as your primary authentication device, so using Face ID or Touch ID or entering the device PIN will be enough for you to log in on various services across the web.” Read More
Humans Still Weakest Link in Cybersecurity
“According to Proofpoint’s 2022 Human Factor report, 55% of U.S. workers admitted to taking a risky action in 2021. Twenty-six percent clicked an email link that led to a suspicious website, 17% accidentally compromised their credentials and only half were able to correctly identify the term phishing.” Read More
Are You Ready for a Breach in Your Organization’s Slack Workspace?
“Slack offers an open and collaborative culture, so while years of phishing attacks created users suspicious of unusual emails, few suspect a message from a co-worker on Slack. Therefore, compromising a single account in Slack can easily be leveraged to deceive other users and gain additional access — not only to other users but to multiple channels.” Read More
Why Cloud Security Matters and Why You Can’t Ignore It
“As convenient as cloud computing has become, it isn’t without problems. Poor cybersecurity planning for cloud applications, such as allowing users to rely on simple passwords, failing to use multi-factor authentication or not applying patches and updates, can leave you vulnerable to attacks.” Read More
5 Real-World AI Cybersecurity Applications That May Benefit Your Business
“Cybersecurity companies need to continually develop security technology as new vulnerabilities and threats arise. They have been effectively using artificial intelligence to do so for a long time. Can AI be a game-changer in protecting our data and privacy?” Read More