Remove cyber-risk security-is-a-process-not-a-tool
article thumbnail

GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted

The Last Watchdog

Even in the cloud era, Microsoft Exchange Server remains a staple business communications tool across the globe. One critical issue faced by organizations that rely on Exchange Server is the risk of a corrupt Exchange Server database cropping up. Related: The need for robust data recovery policies.

Risk 264
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Last Watchdog posed two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? The cyber threat landscape is evolving rapidly. Consumers will begin to see their favorite applications touting “quantum-secure encryption.” Our defensive strategies must evolve.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: The role advanced ‘VM’ is ideally suited to play in combating modern cyber attacks

The Last Watchdog

Modern cyber attacks are ingenious — and traditional vulnerability management, or VM, simply is no longer very effective. The consequences of a cyber attack can be devastating; from a rapid drop in brand reputation to loss of business and sensitive data. Cyber attacks can also invite lawsuits and can even be fatal.

Risk 214
article thumbnail

GUEST ESSAY: The Top 10 cybersecurity shortfalls that put SMBs, enterprises at elevated risk

The Last Watchdog

Even the most well-protected companies can be susceptible to attacks if they are not careful about a proactive approach towards cyber security. Here are a few of the top security weaknesses that threaten organizations today: Poor risk management. No organization is immune to cybersecurity threats. Lackadaisical set up.

Risk 218
article thumbnail

GUEST ESSAY: Making the case for leveraging automation to eradicate cybersecurity burnout

The Last Watchdog

If analysts become exhausted, pessimistic or overwhelmed trying to keep up with relentless and innovative hackers, companies and customer data could be at risk. Here are some of the jobs automation tools could execute that can optimize triage and help analysts stay focused: •Send threat notifications to teams, management and stakeholders.

article thumbnail

GUEST ESSAY: How ‘DPIAs” — data privacy impact assessments — can lead SMBs to compliance

The Last Watchdog

As the world becomes more digital and connected, it is no surprise that data privacy and security is a growing concern for small to medium sized businesses — SMBs. However, SMBs have can struggle with the expense and execution of complying with data security laws in many countries. Related: GDPR sets new course for data privacy.

article thumbnail

Machine vs. machine

OpenText Information Management

This AI-generated moose has been on the hunt for threats and keeping security top of mind. You: How has AI evolved the landscape of security? The same tools that help to generate images and ideas for an innocent brainstorm are being used to create impersonations and more ransomware attacks.