Remove Asset Management Remove Mitigation Remove Risk Management Remove Security
article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

Colonial Pipeline Hack: Failure in Risk Management. For example, a forensic finding made during an evaluation of Colonial Pipeline noted numerous known and preventable vulnerabilities, such as unpatched and outdated systems, that likely led to the security breach. Asset Management. Colonial Pipeline, a major U.S.

article thumbnail

Managing Cyberthreats to Combat Ransomware Part 3: Cybersecurity Frameworks

Zerto

As we continue with our third and final blog in this series on managing cyberthreats, we’ll explore frameworks from the National Institute of Standards & Technology and Center for Internet Security, which together provide time-tested knowledge and best practices used to combat ransomware. Inventory and control of software assets.

article thumbnail

Five Strategies to Protect Against Ransomware and Other Cyberattacks

Risk Management Monitor

Cyberattacks can target many different points in an organization’s ecosystem, including firewall configuration, patch management, network segmentation and defensive technology. The following five strategies can help companies mitigate cyberrisk and respond to threats quickly and efficiently: 1.

Alert 76