The Internet of Things (IoT) industry is growing rapidly with the number of IoT-connected devices projected to surpass 20 billion by 2020. It’s an amazing number, but a number that wouldn’t be possible without the concurrent growth and availability of WiFi and cellular. However, even with all this growth, industry leaders don’t believe existing WiFi and cellular capabilities can keep up with IoT’s trajectory.
If the first war was fought with sticks and stones, the next one likely will be fought with data. Cyber threats both big and small are increasing around the world, and they come with serious implications for governments and businesses that struggle to stay a step ahead of digital criminals.
The infrastructure around the world becomes more connected each day. We can thank the Industrial Internet of Things (IIoT) for this connectedness, which stretches far beyond fitness bands to connecting machines and devices in industries such as transportation, manufacturing, healthcare, construction and more.
Traditional signature-based antivirus is notoriously bad at stopping newer threats such as zero-day exploits and ransomware, but it still has a place in the enterprise, experts say, as part of a multi-layer endpoint security protection strategy. The best antivirus products act as the first layer of defense, stopping the vast majority of malware attacks and leaving the broader endpoint protection software with a smaller workload to deal with.
Threat detection and response is difficult and only getting more complicated. One of the primary reasons is that many organizations approach threat detection and response through a maze of disconnected point tools. In fact, ESG research indicates that 66% of organizations agree that threat detection/response effectiveness is limited because it is based upon multiple independent point tools. But, by all accounts, integration is the key. See how in this infographic!
Stay safe in cyberspace. Contact Awontis today!
They just don’t quit, do they? Hackers and scammers are continuing to baffle security experts as they antagonize innocent folks across the internet. They’re continuously changing tactics and approaches in the hopes of evading authorities – which has the effect of unleashing new threats and obstacles that researchers and engineers are forced to overcome.
There are 2 myths that stand in the way of boards understanding the threats posed by cyberattacks and ensuring their businesses can be safe against cybercriminals and hackers.
Recently, Scott County Schools, in Kentucky, fell victim to a $3.7 million fraud phishing scam. According to Superintendent Dr. Kevin Hub, a vendor informed the district that an invoice sent to the district had not been paid. In looking into the matter, the district found that someone else had been paid instead, via a fraudulent email disguised as the vendor.
“This is a process that we use currently in Scott County Schools. It’s a way that we pay our vendors. And it was in this specific case, a single case, that we can verify, and this fraudulent email and fraudulent documentation is what caused this crime to happen.”
Recently a vulnerability was disclosed that affected millions of Huawei-manufactured laptops. The Chinese manufacturer claimed the vulnerability was a mistake and, in January, patched the affected software. Speculation was rife that this vulnerability might have been injected intentionally with the goal of allowing the Chinese government to exploit it in order to take control of laptops globally at a time of their choosing.