Reevaluating Cyber Strategies, Exploiting Security Tools to Target Organizations, and More.

by | Sep 19, 2024 | This Week in Tech

This Week In Tech, we talk about reevaluating strategies following the global IT outage, hackers misusing security tools to target organizations, and prioritizing cybersecurity within a business.

Reevaluating strategies following the global IT outage.

When faced with a devastating IT failure, like the recent CrowdStrike incident that cost Fortune 500 companies over $5 billion, businesses can feel paralyzed. Here are essential steps to enhance your cybersecurity and mitigate risks:

  1. Regular Software Updates: Keep all software up to date to protect against vulnerabilities that cybercriminals exploit.
  2. Comprehensive Cybersecurity Solutions: Invest in layered security systems with real-time threat detection and response capabilities. Consider application whitelisting to prevent unauthorized applications from running.
  3. Education and Awareness: Train employees to recognize cyber threats, as human error is often a significant factor in breaches.
  4. Regular Security Audits: Conduct thorough audits to identify and address vulnerabilities in your systems and policies.
  5. Incident Response Planning: Develop a clear plan for responding to cyber incidents, detailing roles and communication strategies to minimize impact.
  6. Honesty and Transparency: Communicate promptly and openly about any cybersecurity incidents, as required by regulations.

Implementing these strategies can help safeguard your organization against future cyber threats.

Read More: Forbes

Hackers exploiting security tools to target organizations.

Research indicates that phishing link tampering has evolved, with attackers misusing security tools to distribute malicious links. Threat analyst from Barracuda Networks noted that since mid-May, hackers have been using three URL protection services to mask their phishing links. These tools rewrite hyperlinks in emails, embedding the original URL. When recipients click the “wrapped” link, it triggers a security scan of the original URL. If cleared, they are redirected to it. Attackers likely gain access to these tools by compromising legitimate user accounts, allowing them to identify the victim’s URL protection services. They then activate the URL wrapping feature through an outbound email sent to themselves, enabling the security tool to rewrite the URL with the attacker’s link. This allows them to conceal malicious URLs in their social engineering campaigns.

Read More: IT Pro

Cybersecurity: A business priority, not just a technical issue.

As cyber threats grow more sophisticated, companies must prioritize cybersecurity to protect sensitive data and ensure long-term success. A comprehensive strategy integrates people, technology, and processes, fostering a culture of security awareness.

Impact on Business Operations: Breaches can lead to unauthorized access and significant financial losses, making cybersecurity a strategic priority.

Consequences of Neglect: Ignoring cybersecurity poses serious risks, especially as remote work expands.

Building Awareness: Measures like multifactor authentication enhance security.

Promoting a Cybersecurity Culture: Training employees and engaging stakeholders in proactive security measures is crucial during digital transformation.

Cybersecurity Investment: Investing in cybersecurity is necessary to protect assets and reduce potential breach impacts, minimizing recovery costs and reputational damage.

Read More: Forbes

Here are some more blogs from this category.

Week 2 of Cyber Security Awareness Month, New AI Tools for Health Professionals, and More.

This Week In Tech, we talk about week 2 of Cyber Awareness Month, new AI tools for healthcare professionals, and Microsoft service outages.

October is Cyber Security Awareness Month, Tips for Digital Gift Giving, and More.

This Week In Tech, we talk about cyber security awareness month, week one of Cyber Month, and tips on how to give and receive digital gifts safely.

Combating Phishing Scams with Video Verification, Possible Chip Shortage Due to AI, and More.
This Week In Tech, we talk about combating phishing scams using video verification, AI technology to assist with speech impairments, and how the rising demand for AI...
New ‘Help Me Write’ Feature for Gmail, IHRN Feature Now Available on Samsung Health App, and More.
This Week In Tech, we talk about Gemini’s ‘Help Me Write’ feature for Gmail, Samsung’s new health app feature for irregular heart rhythm...
Microsoft Azure Outage Caused by Cyberattack, What To Do After a Data Breach, and More.
This Week In Tech, we talk about the Microsoft Azure outage caused by cyberattack, steps to take after a data breach, and how ChatGPT is becoming more...
New Smart Ring by Samsung, Common Home Buying Scams, and More.

This Week In Tech, we talk the new smart ring by Samsung, phishing attacks on Apple users via text messages, and 8 scams to avoid when selling your home.

New Security Vulnerability, Cybersecurity Not Ready for AI, and More.
This Week In Tech, we talk about a new security vulnerability called ‘SnailLoad’, if cybersecurity agencies are ready for generative AI, and how Meta has...
Second Cyberattack on CDK Global, Spotting AI Hallucinations, and More.
This Week In Tech, we talk about a second cyberattack on CDK Global, how to spot AI hallucinations, and a groundbreaking test to detect Parkinson’s disease seven...
New Concrete Turning Homes into Giant Batteries, What is Masked Email, and More.
This Week In Tech, we talk about a new concrete capable of transforming homes into energy storage units, what ‘masked email’ is referring to, and X hiding...
Medical AI Solution That Patients Can Talk To, Instagram To Force Ad Breaks, and More.
This Week In Tech, we talk about a medical AI solution that patients can talk to, Instagram testing out a new feature called Ad breaks, and ten useful tips to prevent...