Websites and Web applications are the most visible and vulnerable part of a company’s infrastructure so it’s no surprise that cybercriminals scan thousands of websites every hour in search of vulnerabilities.
The number of cyberattacks where malware holds user data “hostage” is expected to grow in 2016 as hackers target more companies and advanced software is able to compromise more types of data.
Businesses that focus exclusively on building a 10-foot wall to ensure hackers stay on the outside run the risk of learning that an experienced data thief can easily find a 12-foot ladder.
Cybersecurity coverage has taken an odd turn. In the not-so-distant past, when a data breach occurred, journalists would zero in on the kinds and amounts of data that were stolen, and the amount of reputation and bottom-line damage the breach would likely result in. Lately, though, focus has shifted to who perpetrated the breach rather than how it happened.
While an increasing number of companies have a basic data breach response plan in place, many plans do not cover important steps and executives lack confidence in their ability to manage a major breach, according to a new study.