Welcome to the second session of Ironcore’s Zero Trust educational series, Zero Trust – Identity.
Topics: Security, cybersecurity, Technology, Zero Trust, Identity
Topics: Security, cybersecurity, Technology, Zero Trust, Data, Data Classification
You may have heard the phrase, “Zero Trust Cyber Security” recently. However, most people outside of cyber security professionals, don’t really understand what this means. Ironcore would like to help change that.
Topics: Security, cybersecurity, Technology, Zero Trust
Topics: cybersecurity, Cybersecurity Awareness Month, See yourself in cyber, Phishing
Large-scale cyberattacks make the news, but that’s just the tip of the iceberg. Cybercrime is on the rise, and most attacks go unreported. The University of Maryland found that there is an average of 2,244 cyberattacks per day, which is one every 36 seconds. The International Criminal Police Organization (Interpol) reported that small- and medium-sized businesses (SMB) are being targeted at an increased rate. Even 43% of SMB lacks a cybersecurity defense plan. The US Federal Trade Commission, in a recent 6-month period, had seen over 128,000 phone-based fraud scams that cost victims a whopping $108 Million – that’s only half a year! We often assume cybercrime only happens to someone else, but hackers know the easiest way to get to your organization’s information is through YOU!
Topics: cybersecurity, CISA, Cybersecurity Awareness Month, See yourself in cyber
Banks and other financial institutions are prime targets for cybercrime — because that’s where the money is. In fact, recent statistics show that financial service firms were hit 300 more times than other businesses. Each of these cyberattacks typically costs financial service firms millions of dollars.
Topics: cybersecurity, Community Banking
The security threat landscape continues to evolve as more companies transition from self-hosted e-mail and collaboration services to cloud-hosted services, such as Microsoft’s M365. Due to its relatively low risk and high reward potential, malicious actors have shifted their focus to compromising users of cloud services.
Topics: MFA, Conditional Access, M365, Multi-Factor Authentication, Microsoft, Microsoft 365, cybersecurity