Second critical category. Default passwords for access to the application
For the two previous weeks we’ve been discussing the top-9 critical areas and the 33 steps to be taken for security assessment. Ultimately, we’ve covered patch management flaw
from (4)
[Posted on Behalf of Sam Jones Cyber-Man | Helping SMEs get 98% more secure]
Hackers know you're at home and they know your network is vulnerable...
With the UK Government putting pressure on businesses to promote social distancing to avoid the spre
[Posted on Behalf of Pushkal Mishra, AVP IT & CISO HDFC ERGO Health Insurance Ltd.]
While the world is battling with COVID-19, Information security professionals have a double duty to do.
1. Take all the precaution to keep the Coronavirus away on the
1. Take all the precaution to keep the Coronavirus away on the
Email Scams – Phishing / Spear phishing
· Unprotected Internet Connections – Employees when working from anywhere, they can connect to any unsecured Wi-Fi which can easily make easy way for hackers to compromise the data
· Absence of Organizational Sec
CISO Platform
A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.
Join CISO Community Share Your Knowledge (Post A Blog)