article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

While the original document was published in 2006, NIST has confirmed the continued relevance of this NIST Assessment as recently as in 2016 as an access control policy framework. Increasingly, cyber-attacks are occurring through a compromise of user credentials, including the use of phishing, keylogging, and brute force attacks.

article thumbnail

Email Is the Biggest Threat to Business, So Why Is Everyone Using It?

Adam Levin

Email is the preferred tool hackers use to access their targets’ networks: 83% of organizations reported phishing attacks in 2018, up from 76% in 2017. That’s why it doesn’t matter that Bill Gates didn’t come through with the promise of eradicating spam by 2006. People use it because it’s insecure.

IT 45