We’ve long known that one of the most significant risks that any company has is human error and bad online security behavior. As I look at how the pandemic has forced us all to rethink our security postures, I’m struck by the increased volume of attacks and the strategic, manipulative nature of the attacks themselves.
In the wake of recent high-profile data breaches, organizations of all sizes are seeking ways to better protect their business-critical systems and prevent future attacks of a similar nature. According to Cybercrime Magazine, more than half of all cyberattacks are committed against small-to-midsized businesses (SMBs).
The CryptoLocker ransomware attack was one of the most virulent malware attacks. It propagated as an attachment to what appeared as a legitimate e-mail from a well-known company or institution. Upon opening the attachment, CryptoLocker would encrypt data and then demand a ransom be paid by a certain date, in exchange for decryption.
Today, we unpack the final three career myths from our Get the Brett Scott on Cybersecurity (Get the BS on CS) video series. It is my hope that the various topics we will cover throughout this series will be the motivation needed to continue your exploration of a career in cybersecurity and that the truths we have shared will keep you curious about this dynamic field.
Our Cyber Range Engineers have created a Cyber Essentials Video Series to introduce employees, partners and vendors to the foundational concepts and tools necessary to be successful when remotely using the Tech Data Cyber Range.
We had such tremendous success with Part I of our video series, Get the BS on CS (Get the Brett Scott on Cybersecurity) that we are back to debunk a few more myths for you.