A company's response to a breach is more important than almost anything else. But what constitutes a "good" response following a security incident? (By Tyler Farrar, Dark Reading)
This interview with Help Net Security explains what makes passwords vulnerable and suggests some password best practices and policies organizations should implement to keep their systems secure. (By Mirko Zorz, Help Net Security)
A "Top Routinely Exploited Vulnerabilities" report released by cybersecurity authorities from Australia, Canada, New Zealand, the U.K., and the U.S. reveals the top frequently weaponized software flaws. (By Ravie Lakshmanan, The Hacker News)
With the continued digitization of the healthcare industry, the risk of cyberattacks has increased dramatically as healthcare data breaches hit an all-time high last year. A new report found 45 million individuals were affected by healthcare breaches in 2021 alone, up from 34 million in 2020 and triple the 14 million impacted in 2018. (By Brian Foy, Forbes)
Since April 2022 phishing emails have been sent to Gmail users from legitimate addresses, making it hard to tell spam from legitimate sources. (By Brian Stone, TechRepublic)