Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Cybersecurity Posture
You are here: Home \ Cybersecurity Posture
Posted on Friday, May 1st, 2020 by
In response to the COVID-19 pandemic businesses the world over are accelerating their cloud migration to meet demand. As we move out of our corporate buildings and work from home offices, the need for online meetings and remote access to corporate resources takes on new meaning. When Cloud computing first smashed the corporate perimeter wall,...

Topics: Cloud Security, COVID-19, Cybersecurity Posture, Response Planning, Risk management, wfh, Working from home

Posted on Thursday, April 9th, 2020 by
Cyberattacks have increased in frequency during COVID-19 and now more than ever is the time to consider going passwordless to be more secure. The password is a simple thing that is employed throughout our digital life, enabling us to access myriad online and company resources. However, a survey by Dashlane found that we each have,...

Topics: Coronavirus, COVID-19, Cybersecurity Posture, Office 365 Security, Phishing, Ransomware, Remote working, Uncategorized, wfh, Working from home

Posted on Friday, January 17th, 2020 by
A Cybersecurity Posture Assessment gives your company the intelligence to know where you stand with respect to cybersecurity risk. The modern business faces cybersecurity challenges as never before. These challenges are being complicated by sophisticated techniques such as social engineering. Cyber-threats are compounded and facilitated through the hyper-connectivity offered by cloud computing, mobile devices, and...

Topics: Cybercrime, Cybersecurity Posture, Social Engineering, Uncategorized

Posted on Friday, January 10th, 2020 by
As cyber-attacks targeting cloud infrastructures increase, using a Cloud Security Posture Assessment can help you determine how best to reduce your organization’s risk. Indeed, cloud computing has become firmly established by organizations of all sizes and across all sectors. A cloud-based infrastructure facilitates digital transformation, offering opportunities to use best-of-breed cloud apps to help improve...

Topics: Cloud Security, Cybercrime, Cybersecurity Posture, Digital Transformation

People_Cybercrime_2019
Posted on Friday, December 20th, 2019 by
The state of people and cybercrime is reaching new heights. What do we mean by this? Cybercriminals are mastering the art and science of behavior manipulation. Phishing and other methods of social engineering are so prevalent that Proofpoint announced that 99% of all cyber-attacks need human intervention to proceed. In order to counter this, security awareness...

Topics: Cybercrime, Cybersecurity Posture, Deepfake, Penetration Testing, Ransomware, Social Engineering, Supply Chain

Posted on Thursday, December 12th, 2019 by
As cloud computing embeds itself in our corporate culture, how has security impacted its use in 2019? In this blog article, we looked at how the state of cloud security enabled business in 2019 and also found areas of concern around security.

Topics: Cloud Security, Cybersecurity Posture, Darknet Intelligence, DDoS, Vulnerability Assessment

Deepfakes and Cybercrime
Posted on Thursday, November 14th, 2019 by
How are deepfakes and cybercrime related? What is this recent deepfake trend? And what are some cybercrime examples of deepfake technology?  Back in 2018, researchers found 14,698 deepfake videos online. But what is this phenomenon about and how will it affect businesses and individuals in the years to come? 

Topics: Artificial Intelligence, Cybersecurity Posture, Digital Transformation, Phishing, Social Engineering, Trends & Technologies, Uncategorized

Credit Unions Cybersecurity Posture
Posted on Thursday, October 31st, 2019 by
How can credit union professionals strengthen their cybersecurity posture? Much like banks, credit unions hold large amounts of highly sensitive data about members, including financial and personal information such as credit scores, banking information and investment history. In this blog article, we'll talk about why cybersecurity is important for credit unions, how credit unions can evaluate and improve their cybersecurity posture, and which first steps credit unions should undertake to strengthen their security defenses.

Topics: Compliance, Control Assessment, Cybersecurity Posture, Security Practices, Tips & Tricks, Uncategorized

Social Engineering
Posted on Thursday, October 3rd, 2019 by
How can today’s cyber-aware businesses prevent social engineering attacks? In this blog article, we look at some techniques and measures that an enterprise can use to protect their network and resources against the scourge of social engineering-based cyber-attacks, including security awareness training, phishing simulation, cybersecurity posture assessments etc.

Topics: Cybersecurity Posture, Managed Security Services, MSS, Phishing, Social Engineering, Tips & Tricks, Uncategorized

Posted on Tuesday, September 17th, 2019 by
What exactly is social engineering and how does it work? In this blog article, we talk about this very popular (ethical) hacking practice, describe how and why it works and provide a breakdown of a socially engineered scam.

Topics: Artificial Intelligence, Cybersecurity Posture, Penetration Testing, Phishing, Security Practices

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now