7 Ways to Prepare for a Cybersecurity Audit
Data breaches, phishing attacks, information disclosure – the Internet can be a scary place. Conducting a cybersecurity audit (or getting a third-party assessment) is a great way to understand your organization’s cybersecurity posture. But, like preparing any exam or review, getting ready for a cybersecurity audit can be intimidating. While every security assessment will be a bit different, here are seven ways you can prepare for your next cybersecurity audit.
Cybersecurity Needs Women
Women comprise only 11% of these professionals worldwide, and only 14% in North America (see ‘Women in cybersecurity’). By comparison, women make up 57% of the US workforce. […] Cybersecurity’s future depends on its ability to attract, retain and promote women, who represent a highly skilled and under-tapped resource. The discipline also needs to learn about women’s experiences as victims of cybercrime and the steps needed to address the imbalance of harm.
Cyber Attacks Pose Biggest Threat to Swiss Financial System: Regulator
“The risks connected with these attacks are growing in sync with the pace of global digitalization. Cyber attacks are now the most serious operational hazard facing the financial system, and both the private sector and public authorities should take them extremely seriously,” Chief Executive Mark Branson told the Financial Market Supervisory Authority’s annual news conference.
Top 10 Vulnerabilities Used by Cybercriminals
According to the report, the most commonly abused vulnerability last year was CVE-2017-0199, a remote code execution vulnerability in Microsoft Office and WordPad that is associated with a wide variety of malware and exploits, including Latentbot, Microsoft Word Intruder, Hancitor, Dridex, FinFisher, Silent Doc Exploit, REMOCS, PoohMilke, Freenki, FreeMilk and Cerber.
Stay up to date on the Financial Services Information Security news that you need to know by signing up for our Financial Cybersecurity Briefing Here.
Critical Informatics and the Critical Informatics logo are the trademarks of Critical Informatics, Inc. All other brand names, trademarks, service marks and copyrights are the property of their respective owners. © 2017 Critical Informatics, Inc. All rights reserved.