Latest Cybersecurity News 2023-06-12 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: The Importance of an Asset Inventory  You are faced with an announcement that certain applications on your network are in urgent need of patching, and selected devices need to be replaced immediately for security reasons. Can you respond?  Asset management is one of […]

Latest Cybersecurity News 2023-06-05 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Chasing Regulatory and Legislative Compliance It’s challenging to keep up with regulatory and compliance changes. It’s important to keep up with new legislation, as well as track potential changes in the future. Planning and preparation are key to maintaining smooth operations. Here are […]

Determining How to Allocate Your Cybersecurity Budget

Protecting What Matters: Determining How to Allocate Your Cybersecurity Budget How to spend your next cyber dollar is a question you’ve asked yourself, and has likely been asked by your leadership team. The answer to that question should actually be straightforward: if it isn’t, then you should be reflecting on your entire cyber maturity program – not just deciding on which purchase order to […]

Latest Cybersecurity News 2023-05-29 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: What is “Living off the Land”?  Living off the Land (LOTL) is a cyber attack technique increasingly used by sophisticated threat actors. Early in an attack, rather than deploying their own hacking software or scripts (which may raise the attention of EDR or […]

Latest Cybersecurity News 2023-05-23 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Tap into CISA’s Known Exploited Vulnerability (KEV) catalog The Cybersecurity & Infrastructure Security Agency (CISA) maintains a comprehensive list of system vulnerabilities that have been exploited in the wild. The Known Exploited Vulnerability (KEV) catalog https://www.cisa.gov/known-exploited-vulnerabilities is a provides a one-stop destination for […]

Latest Cybersecurity News 2023-05-15 Edition

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Watch out for .ZIP and .MOV web domains Top-level domains (or TLDs) are the last portion of a website name (“.com” is the TLD for isacybersecurity.com, for example). Google recently registered two new TLDs: .ZIP and .MOV. This may cause confusion, as most […]

Latest Cybersecurity News 2023-05-08 Edition

ISA CyberNew

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: Don’t use “admin” accounts for daily activities Never use an administrator account or other privileged “super user” credentials for your day-to-day work. Admin accounts provide heightened access to your system – and potentially others – so they should only be used in cases […]

Strategies to Defend Against the 15 Common Cyber Attack Vectors

15 Cyber threats

Cybersecurity is a critical aspect of today’s digital age, where individuals and organizations are susceptible to cyber attacks. As we rely more on technology, cyber attacks become increasingly prevalent, and attackers continue to find new methods to exploit systems. In 2022 alone, Canada saw a 20% increase in cyber attacks[1], while the global numbers increased […]

Latest Cybersecurity News 2023-05-01 Edition

ISA CyberNew

Follow ISA Cybersecurity on LinkedIn for the latest cybersecurity news Weekly CyberTip: The importance of IoMT inventories While IoMT (Internet of Medical Things) devices help make healthcare environments more efficient and effective, they can create security exposures unless they are properly configured and maintained at current patch levels. Attacks on these devices can cause service […]

SUBSCRIBE

Get monthly proprietary, curated updates on the latest cyber news.