Legal and C-suite teams should make decisions ahead of time regarding possible cybersecurity worst-case scenarios, writes Alex Holden, chief information security officer at Hold Security. Holden notes the ISACA Ransomware Pulse Poll, in which about half of enterprises consider ransomware to be their biggest cyberthreat.
Four of Russia's largest ransomware gangs have affiliated, sharing hacking resources but apparently not the profits, says Jon DiMaggio, chief security strategist at Analyst1. DiMaggio identifies the groups as LockBit, Viking Spider, Wizard Spider and Twisted Spider, and notes that with "coordination and organization, their ransomware strains can be more dangerous than any one individual cyberweapon."
The Judson Independent School District in San Antonio has paid off ransomware attackers but won't say when or how or disclose the amount. An attack last month shut down the district's computers, phones and email accounts.
Some ticket holders of the Tokyo Olympics have had their log-in identifications and passwords leaked online, said an unidentified government official. One report said the breach was caused by unauthorized access to a computer or a smartphone.
The idea that a university degree is necessary to pursue a career in IT "is a myth that needs busting," writes Jon Lang, CEO of DDLS, a training company in Australia. "We must recalibrate our understanding of education and move away from the traditional perspective that university degrees are the superior option."
The Internet of Things security breach at Peloton, a maker of stationary bicycles and exercise equipment, is a bad omen for a long, cold winter of security incidents, writes Emil Sayegh, CEO of cloud services provider Ntirety. Sayegh notes that "the smallest bits of leaked data can be enough to compose purpose-built phishing attacks or stacked into significant waves of fraud."
Paul Rubens passes along eight tips to safeguard enterprises' accounts in the cloud, starting with passwords of more than 13 characters that include upper- and lower-case letters, numerals and special characters. Rubens concludes with the obvious: Always log out, because failing to do so increases hackers' chances to enter.