Latest Cybersecurity News 2021-09-27 Edition

Cyber News Banner 2021-09-27-Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Be on the lookout for text message attacks “Smishing” or SMS-based phishing attacks aren’t as common as email-based phishing, but they can be dangerous too, so stay cyber savvy! To limit your risk, don’t click on any unexpected or suspicious links received in […]

Latest Cybersecurity News 2021-09-21 Edition

Cyber News Banner 2021-09-21-Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: The Importance of Internal Audit Even companies with mature cybersecurity practices need to conduct regular internal audit to verify their security programs. Internal, yet independent, auditors can work with management and IT functions to assess and test security practices to identify systemic security […]

Latest Cybersecurity News 2021-09-13 Edition

ISA CyberNews 2021-09-13 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Remember that patch management is a moving target This week’s news articles provide a reminder that vulnerability management is often more complex than “just applying a patch”. Once technical details of vulnerabilities have been published in company forums or researcher blogs, threat actors […]

Latest Cybersecurity News 2021-09-08 Edition

CyberNews 2021-09-08 Edition poster

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: The Importance of Asset Inventory Maintaining a detailed and current digital asset inventory is a key foundational element of your cybersecurity program. Having a complete view of your digital fleet supports organized patch management, streamlines incident response, puts you in a stronger compliance […]

Latest Cybersecurity News 2021-08-30 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Don’t use “admin” accounts for daily activities Never use an administrator account or other privileged “super user” credentials for your day-to-day work. Admin accounts provide heightened access to your system – and potentially others – so they only be used in cases where those powers are […]

5 Security Challenges & 5 Cyber Risks for Fintech

5 Cybersecurity Challenges & Risks for Fintech Title with hand holding mobile phone with finance app open

The use of fintech – a catch-all term for any financial sector technology that’s used to digitize or streamline traditional financial services – is widespread today. Like most technologies, fintech introduces benefits through efficiency, but also creates potential operational risks at the same time.  Fintech concepts have been around for decades, but fintech as we know it today rose from […]

Latest Cybersecurity News 2021-08-24 Edition

Cyber News Banner 2021-08-24 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Incident Response for DDoS DDoS attacks are unique cyber threats, and require a focused approach to successfully manage and mitigate. The Canadian Centre for Cyber Security (CCCS) suggests a four-step approach of identify, contain, recover, and review. See their DDoS post for more […]

Latest Cybersecurity News 2021-08-16 Edition

Cyber News Banner 2021-08-16 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Disable Unused Services Many Windows-based cyber attacks exploit flaws in services running on a server or workstation computer. While patching is always recommended, it’s even safer to disable unused services on your systems. Aside from improving performance, having fewer services can reduce your […]

Latest Cybersecurity News 2021-08-09 Edition

Cyber News Banner 2021-08-09 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Ethical Hacking Ethical hacking should be a part of every company’s cybersecurity program. We all do our best to secure our networks and data, but having a trusted independent expert attempt to breach those defenses in a controlled fashion can help identify unknown vulnerabilities – before […]

SUBSCRIBE

Get monthly proprietary, curated updates on the latest cyber news.