One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Blog
Identifiant 2694605
Date de publication 2021-04-26 10:00:00 (vue: 2021-04-26 11:05:38)
Titre The 5 most crucial Cybersecurity updates for businesses in 2021
Texte This blog was written by an independent guest blogger. For as long as businesses have used computers, cybersecurity has been crucial. Now, as modern business and data are becoming inseparable, it’s an absolute necessity. As companies start to recover from 2020 losses, they should consider investing in security updates. Cybercrime reached new heights in the past year, with internet crime reports rising 69.4% and costing more than $4.2 billion. Now that more companies are embracing digital services after the pandemic, this trend will likely continue. All businesses, regardless of size or industry, must revisit their cybersecurity. Here are the five most important cybersecurity updates for this year. 1. Implementing a Zero-Trust framework The single most crucial cybersecurity upgrade for businesses this year is adopting a zero-trust security framework. These systems, which rely on network segmentation and thorough user verification, aren’t new but are increasingly crucial. In light of rising cyberthreats, companies can’t afford to trust anything inside or outside their networks without proof. A 2020 survey found that 82% of company leaders plan to let their employees work remotely at least part time after the pandemic. That many people accessing data remotely raises security concerns. Hackers could pose as remote workers to gain access or install spyware, and IT teams wouldn’t know it. Zero-trust models mitigate these threats. Verifying user identity at every step helps guarantee only employees can access mission-critical data. Segmentation ensures that only those who need access can get it, and if a breach occurs, it won’t impact the entire network. 2. Securing machine learning training data Machine learning algorithms are becoming increasingly common among companies in various industries. These models take considerable amounts of data to train, which presents an enticing opportunity for cybercriminals. As more companies rely on machine learning, more threat actors will likely try to poison the training data. By injecting incorrect or corrupt data into the training pool, cybercriminals could manipulate a machine learning system. If companies don’t catch the problem before it’s too late, the algorithms they rely on could influence poor or even harmful business decisions. Given this threat, securing machine learning training data is a must. Businesses should carefully inspect the information they use to train machine learning models. They should also enact stricter access controls over training pools, including activity monitoring. 3. Verifying third-party and partner security Businesses should also look outward when improving their cybersecurity. The growing public awareness of cyberthreats is changing expectations about visibility, and that’s a good thing. It’s no longer sufficient to trust that a business partner or third party has robust data security. Companies must verify it. Third-party data breaches in 2020 exposed millions of records, and major events like the SolarWinds hack have revealed how fragile some systems are. In light of these risks, businesses must ask all potential partners to prove
Envoyé Oui
Condensat 2018 2020 2021 716 about absolute absolutely access accessing activity actors adopting afford after against algorithms all already also always amid among amounts any anything are aren’t arise ask automated awareness backups becoming been before behave behavior between billion blame blog blogger breach breaches business businesses but can can’t carefully carelessness case catch cause caused changing climb common communication companies company complacency computers concern concerns consider considerable considerations continue continues continuity controls corrupt cost costing could cover creates creating crime crisis critical crucial cybercrime cybercriminals cybersecurity cyberthreats data decisions defend departments design developing digital don’t embracing emergencies emergency emerging employees enact engaging ensure ensures ensuring enticing entire entryways even events every everyone expectations exposed first five formulate found fragile framework from functions gain get given good growing guarantee guest hack hackers harmful has have heights help helping helps here home how identify identity impact implement implementing important improving including incorrect increase increasingly independent industries industry influence information injecting inseparable inside insider insidious inspect install internet investing involves it’s jumped keep know knows late leaders leading learning least let light like likely limiting long longer look losses machine major manipulate manual many millions minimize mission mitigate models modern monitor monitoring more most must necessity need network networks never new not now number occurs often once only opening operational opportunity outside outward over pandemic part particularly parties partner partners party past people periodically plan planning poison pool pools poor pose potential potentially preparation prepare presents priority problem processes prominent proof protect prove public raises reached records recover regardless related relevant rely remote remotely reports resources revealed reviewing revisit rising risks risky robust role rose running safe safely scenarios secure securing security segmentation services should simulated single size small software solarwinds solutions some spot spyware start stay step stop stricter suffer sufficient survey system systems tabs take teams than that’s them these they’re thing think third thorough those threat threats time today too top train training trend troubling trust try typically unrealistic updates upgrade upgrading use used user various verification verify verifying visibility vulnerability what when which who will without won’t work workarounds worker workers working worst wouldn’t written year year’s zero
Tags Data Breach Hack Threat Guideline
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: