Every year, we look forward to promoting Cybersecurity Awareness Month (CSAM) for it’s an opportunity to rally with the industry in bringing security awareness to the masses. In it’s 18th year, CSAM has helped people be safe and secure in their daily digital lives.
CSAM, led by Cybersecurity & Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA), kicks off this week and introduces the schedule of weekly themes. The organization invites companies to participate and lend their security expertise. The momentum has grown over the years reaching consumers, small and medium-sized businesses, corporations, and educational institutions across the nation.
We’re excited to do our part in covering security topics that our customers care about. Our bench of “extraordinary gentlemen,” Chris Morales, John Bambenek, and Simon Aldama, will share their perspectives tinged with added humor, wit and big doses of “been there, done that” experiences.
First out of the gate, John Bambenek pens a blog entitled “Fakes Lies Matter: Rise in Brand Impersonation Attacks.” Cyber criminals have increased their social engineering attacks to get into company networks via the human gateway. How do we begin to stop these attacks? Or find out where they’re hiding in our environments?
Throughout October, we’ll uncover the complexities and ways to manage and resolve issues around:
Rise of cryptocurrency and ransomware attacks
Cryptocurrency is everywhere now. People are transacting with crypto monies or stock trading. Companies are paying outrageous ransom amounts to criminal syndicates who are holding businesses hostage. Attackers follow the money and crypto attacks are on the rise. What do companies need to know?
Security Fatigue: Avoid Cyber Burnout
CSAM theme for week 3 focuses on training and education to expand security skills and increase the talent pool of experts. Our spin spotlights the front-line security workers, their well-being, value and effectiveness. The effects of the pandemic and rise in security demands have pummeled these experts badly. They’re leaving companies or finding other IT positions that are non-security which creates a huge void and demand. If they stay, they’re fatigued and overwhelmed to the point of complacency. Both are bad for business.
Be a Hunter, Think Like an Attacker
It’s now critical to shift your security mindset and model. Be the nefarious criminal, in the latest Marvel blockbuster, who is finding ways to destroy you. Modern security operations need to work in the same way – think like an attacker. What is your company’s most valuable assets? Is it taking your company down? Is it for monetary gain? We’ll discuss ways to take a risk-based security approach that’s predictive and proactive, that anticipates attacks and threats. Hint: it’s not buying more tools.
Visit the Cybersecurity Awareness Month website for more details.
Subscribe To Our Newsletter!
The best source of information for Security, Networks, Cloud, and ITOps best practices. Join us.
Thank you for subscribing!