Remove 2023 Remove Authentication Remove Information Security Remove Network
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

article thumbnail

3 ways to deter phishing attacks in 2023

CIO Business Intelligence

Don’t log in to WiFi networks you don’t trust. Done correctly, these simple steps can make your staff battle-hardened defenders of your network. You often hear that people are security’s weak link. Deploy email authentication standards on enterprise email servers to check and verify inbound emails. Double check.

Training 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO Business Intelligence

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] Zero Trust network security offers cybersecurity benefits vs. traditional perimeter-based network security models.

article thumbnail

Activision Hack Exposes Employee Data and 'Call of Duty' Information

SecureWorld News

It reported that hackers gained access to Activision's network by successfully phishing a privileged user on the network on December 4, 2022. vx-underground also reported that a hacker managed to break into an Activision Slack channel, post offensive messages, and steal information related to upcoming "Call of Duty" releases.

Data 83
article thumbnail

You never know who is after your data

Dataconomy

If you think that your servers that are not connected to any network in a local environment are safe, you are wrong because tailgating attacks, an old but effective way threat actors use to access data or information of a company, can still target your sensitive data.

Data 48
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

A simple Google search can reveal that some of the major airlines with state-of-the-art IT infrastructure had customer data stolen due to security breaches. According to Verizon’s 2023 Data Breach Investigation Report (DBIR), the transportation industry as a whole was breached 249 times with 349 incidents reported. The PCI DSS v4.0,

article thumbnail

Talking Zero Trust and SASE with CISOs at the Summit

CIO Business Intelligence

There aren’t many events where a critical mass of Chief Information Security Officers gathers to exchange ideas about the current threat environment, key initiatives, etc. The annual Gartner Security and Risk Management Summit is one of them, and I’m looking forward to attending it this year.

WAN 118