article thumbnail

The CISOs Guide to Storage & Backup Cyber Resiliency

Solutions Review

In this feature, Continuity ‘s CTO Doron Pinhas offers CISOs rely on information from across the organization about security, particularly from the various IT departments. Unfortunately, the information being fed to CISOs about the state of cybersecurity risk is incomplete. There is a blind spot present – a gaping hole.

article thumbnail

Holiday Hacking: Watch Out for These Deceptive Tricks

NexusTek

In fact, Uber was attacked this year by threat actors who purchased a password on the dark web 2. Once inside, the hackers were able to download information from one of Uber’s finance tools. If cybercriminals were looking for an easy way into a company’s network, they might simply peruse the marketplace for stolen passwords.

article thumbnail

3 Things Every Organization Should Do to Protect Against Cybercriminals

Risk Management Monitor

Whether it is phishing scams or malware, hackers are constantly finding new ways to attack businesses. Investing in threat-monitoring and endpoint protection tools can also help. Cybersecurity should be a top priority for organizations today, especially as employees continue to work remotely without business-grade protections.