Blog Banner

The Top 48 Malware Attacks of 2019

The first half of 2019 demonstrated that no environment is immune to malware attacks. We have witnessed threat actors developing new tool sets and techniques, targeting corporate assets stored on cloud infrastructure, individuals’ mobile devices, trusted third-party suppliers’ application and even popular mail platforms.

8 Times Businesses Got Hacked by Not Securing IoT Devices

Many times the threat of not securing IoT devices is not an attack on the device itself, but an attack on the company's larger infrastructure resulting in financial and productivity loss. Gartner claims there are will be over 7 billion connected “things” for business use by 2020. International organizations in particular must now ensure they build security into every new IoT system, or face compliance issues from GDPR and NIS Directive regulators. US firms are going to invest the most in IoT in the coming 12 months: $2.8m. There’s a sizable minority (42%) of organizations involving security teams early on in IoT projects, but conversely the largest number globally (72%) who claim they always define their security needs during projects. However, just 34% said the CISO is ultimately responsible for IoT security, among the lowest worldwide. The company board may discuss the incident recovery plan but have little oversight of the way the company is securing IoT devices in the first place.

Tips & Tricks: How to Identify Spear Phishing Emails

Our CIO breaks down what to look in a phishing email

This blog isn't just a leisure article, this blog is part of our on-boarding new hire process and intrusion prevention plan at New Horizons Learning Group. With hundreds of employees across four states, we are constantly educating our employees on how they can prevent attacks. 

New Horizons Announces Blockchain Training

Learn about how decentralized blockchain technology is increasing transparency and security across industries

We at New Horizons Learning Group are excited to be announcing our partnership with the Blockchain Training Alliance to deliver cutting edge Blockchain training and certifications!

10 Mobile Cybersecurity Threats according to Metova

Metova are the minds behind CyberCENTS cybersecurity training programs. Read on for a link to their full article as well as a quick rundown of their top 5 biggest mobile threats facing security professionals today.

RSS

Contact author

x

Subscribe for Future Blog Notifications