One Article Review

Accueil - L'article:
Source AlienVault.webp AlienVault Lab Blog
Identifiant 8429741
Date de publication 2023-12-27 11:00:00 (vue: 2023-12-27 11:07:52)
Titre Cybersécurité post-pandémique: leçons de la crise mondiale de la santé
Post-pandemic Cybersecurity: Lessons from the global health crisis
Texte The content of this post is solely the responsibility of the author.  AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article.  Beyond ‘just’ causing mayhem in the outside world, the pandemic also led to a serious and worrying rise in cybersecurity breaches. In 2020 and 2021, businesses saw a whopping 50% increase in the amount of attempted breaches. The transition to remote work, outdated healthcare organization technology, the adoption of AI bots in the workplace, and the presence of general uncertainty and fear led to new opportunities for bad actors seeking to exploit and benefit from this global health crisis. In this article, we will take a look at how all of this impacts the state of cybersecurity in the current post-pandemic era, and what conclusions can be drawn. New world, new vulnerabilities Worldwide lockdowns led to a rise in remote work opportunities, which was a necessary adjustment to allow employees to continue to earn a living. However, the sudden shift to the work-from-home format also caused a number of challenges and confusion for businesses and remote employees alike. The average person didn’t have the IT department a couple of feet away, so they were forced to fend for themselves. Whether it was deciding whether to use a VPN or not, was that email really a phishing one, or even just plain software updates, everybody had their hands full. With employers busy with training programs, threat actors began intensifying their ransomware-related efforts, resulting in a plethora of high-profile incidents in the last couple of years. A double-edged digital sword If the pandemic did one thing, it’s making us more reliant on both software and digital currencies. You already know where we’re going with this—it’s fertile ground for cybercrime. Everyone from the Costa Rican government to Nvidia got hit. With the dominance of Bitcoin as a payment method in ransoming, tracking down perpetrators is infinitely more difficult than it used to be. The old adage holds more true than ever - an ounce of prevention is worth a pound of cure. To make matters worse, amongst all that chaos, organizations also had to pivot away from vulnerable, mainstream software solutions. Even if it’s just choosing a new image editor or integrating a PDF SDK, it’s an increasing burden for businesses that are already trying to modernize or simply maintain. Actors strike where we’re most vulnerable Healthcare organizations became more important than ever during the global coronavirus pandemic. But this time also saw unprecedented amounts of cybersecurity incidents take place as bad actors exploited outdated cybersecurity measures. The influx of sudden need caused many overburdened healthcare organizations to lose track of key cybersecurity protocols that could help shore up gaps in the existing protective measures. The United States healthcare industry saw a 25% spike in successful data breaches during the pandemic, which resulted in millions of dollars of damages and the loss of privacy for thousands of patients whose data was compromis
Notes ★★
Envoyé Oui
Condensat 100 2020 2021 220 400 800 absolutely access accommodate across actors adage address adjustment adopt adoption against alert alike all allow already also among amongst amount amounts amply analyze anxiety any approach are article at&t attacks attempted author authorizations average aware awareness away bad bank became become began benefit best better between beyond biggest bitcoin board both bots breach breaches bring broad broke burden burst businesses busy but campaigns can card careful caused causing challenges channels chaos chatgpt choosing climate coerced comes common communication companies compliant compromised compulsory conclusions confidential confusion content continue coronavirus costa could couple credit crises crisis cure currencies current cyberattack cyberattacks cybercrime cybercriminals cybersecurity cybersecurity: cycle damage damages dangers data deciding department details did didn’t difficult digital does dollars dominance double down drawn driven during earn easily edged editor education efforts email emergency employees employers enact endorse engineering enmeshed ensure entities era erupted essential even event ever every everybody everyone existence existing experts exploit exploited extorted face fact factor fall falsely familiar faulty fear federal feet fend fertile figures firms first forced format forms forward fraud frightening from full future gaining gaps general global going got government greater ground had handing hands has have health healthcare heart help high highly hipaa hit holds home how however human identity image impacts impersonating important incidents include includes including increase increasing individuals industry infinitely influx information ingratiate innovations insidious instances intangible integrating intensifying issues it’s its jobs just key know last lasting layered leaked learned learning led lessons like likelihood living lockdowns look looming lose loss love mainstream maintain make making manner many matters may mayhem means meant measures method might million millions misinformation misrepresenting mistakes mitigating model modernize money months more most much multi must national necessary need networks new news next not now number nvidia office official old one only opportunities organization organizations other others ounce outdated outside over overburdened pandemic past patient patients payment pdf people people’s periods perpetrators person personal phishing physical pivot place placed plain plans plethora point points positions post pound predict predicting prepare prepared presence presenting prevention prey privacy profile programs protect protective protocols provided providing public put ransoming ransomware really realm recent records regulations related released reliant relied remote replace reservations response responsibility result resulted resulting revealed rican rise rose saw scripts sdk secure secured security seeking sensitive serious share shift shore should simply since smart social software solely solutions specific sphere spike squarely staggering starting state states strike studies successful such sudden sufficiently susceptible sword synthetic system systems take taking tech techniques technological technology than them themselves then these thing this—it’s thousands threat through time today too took track tracking training transition tricked true trust trusting trying turbulent turn two uncertainties uncertainty united unmeasurable unprecedented unsuspecting update updates use used users verified victims views vital vpn vulnerabilities vulnerability vulnerable way we’re well went what whatever when where whether which who whopping whose will within work workplace world worldwide worrying worse worth wrong years zero
Tags Data Breach Vulnerability Threat Studies Prediction
Stories ChatGPT
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: