How Can Businesses Defend Themselves Against Common Cyberthreats?

TechRepublic consolidated expert advice on how businesses can defend themselves against the most common cyberthreats, including zero-days, ransomware and deepfakes.

By |2024-05-10T13:00:08+00:00May 10, 2024|ai, Artificial Intelligence, Big Data, CXO, cyber security, cybersecurity, data breach, deepfakes, Hardware, International, Internet of Things, iot, ransomware, Security, social engineering, Software, supply chain, Uncategorized, zero-days|Comments Off on How Can Businesses Defend Themselves Against Common Cyberthreats?

Kaspersky Study: Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020

Nearly 10 million devices were infected with data-stealing malware in 2023, with criminals stealing an average of 50.9 credentials per device.

By |2024-04-18T16:26:44+00:00April 18, 2024|Big Data, CXO, cyber security, data breach, International, kaspersky, malware, ransomware, Security, Uncategorized|Comments Off on Kaspersky Study: Devices Infected With Data-Stealing Malware Increased by 7 Times Since 2020

Cyber Security Trends to Watch in Australia in 2024

Ransomware attacks on infrastructure and mid-market businesses are tipped to rise, while the use of AI cyber tools will grow as IT customers seek more signal and less noise from vendors.

By |2023-12-20T20:01:01+00:00December 20, 2023|Artificial Intelligence, Australia, critical infrastructure, CXO, cyber attack, cybersecurity predictions 2024, data breach, International, ransomware, Security, Uncategorized, vendor consolidation|Comments Off on Cyber Security Trends to Watch in Australia in 2024

Australian CEOs Struggling to Face Cyber Risk Realities

Research has found 91% of CEOs view IT security as a technical function that's the CIO or CISO's problem, meaning IT leaders have more work to do to engage senior executives and boards.

By |2023-11-01T11:48:03+00:00November 1, 2023|Australia, boards, ceo, cio, ciso, CXO, cyber risk, cyber security, cybersecurity, cybersecurity engagement, data breach, executives, International, it leaders, risk management, Security, security risks, Uncategorized|Comments Off on Australian CEOs Struggling to Face Cyber Risk Realities

Is Rapid Data Recovery the Best Hope Australia Has for a Win Against Ransomware?

The success of cyber attacks in Australia could make an "assume-breach" approach to cyber security inevitable and cause IT teams to shift their focus to protecting data backups at all costs.

By |2023-10-12T09:02:55+00:00October 12, 2023|Australia, cyber resilience, data breach, data recovery, International, itops, ransomware, ransomware attacks, rubrik, secops, Storage, Uncategorized, zero trust|Comments Off on Is Rapid Data Recovery the Best Hope Australia Has for a Win Against Ransomware?

Australian Data Breach Costs are Rising — What Can IT Leaders Do?

Australian data breach costs have jumped over the last five years to $2.57 million USD, according to IBM. Prioritizing DevSecOps and incident response planning can help IT leaders minimize the financial risk.

By |2023-09-08T19:35:16+00:00September 8, 2023|Australia, cost of a data breach, CXO, data breach, data breach cost, data breach report, ibm, ibm data breach report, International, Security, Uncategorized|Comments Off on Australian Data Breach Costs are Rising — What Can IT Leaders Do?

Get a Lifetime of Powerful VPN Protection for Your Business Data for Just $70

There’s no reason to take chances of your business suffering a data breach when a lifetime of powerful protection is so affordable.

By |2023-07-19T09:03:29+00:00July 19, 2023|Android, CXO, data breach, ios, ip address, lifetime license, linux, macos, Security, sensitive data, Uncategorized, VPN, windows|Comments Off on Get a Lifetime of Powerful VPN Protection for Your Business Data for Just $70

How to minimize security risks: Follow these best practices for success

To reduce security threats within your organization, you must prioritize security risk management. Here are some best practices to follow, as well as some top resources from TechRepublic Premium. The post How to minimize security risks: Follow these be...

By |2023-03-09T15:58:22+00:00March 9, 2023|cybersecurity, data breach, risk management, Security, TechRepublic Premium, Uncategorized|Comments Off on How to minimize security risks: Follow these best practices for success

How hackers stole the personal data of 37 million T-Mobile customers

The criminals took advantage of an API to grab personal details such as customer names, billing addresses, email addresses, phone numbers, dates of birth, and T-Mobile account numbers. The post How hackers stole the personal data of 37 million T-Mobile...

By |2023-01-24T20:41:36+00:00January 24, 2023|customer data, data breach, data exfiltration, personal data, phishing, Security, t-mobile, Uncategorized|Comments Off on How hackers stole the personal data of 37 million T-Mobile customers
Go to Top