wonderfully unique software solutions

Cybersecurity training is more important than ever as risk rises, notes CBT Nuggets

Research continues to report that threats to businesses and individuals from malicious cyberattack are, if anything, intensifying.

Asif Muhammad, writing for training provider CBT Nuggets, argues that the variety and number of cybercriminality approaches are part of what’s driving the phenomenon.

“Strengthening cybersecurity defences remains a work in progress for many organisations that recognise their shortcomings but have yet to take the necessary steps,” he pointed out.

“Cybercriminals are constantly changing their cyberattacks, especially against physical cyber and IoT systems, as they present additional vulnerabilities due to limited capabilities, uncontrolled nature, and the use of potentially untrusted components.”

It follows that organisations need to shore up their defences, including with training approaches that ensure individuals are better prepared to reduce the risk and respond appropriately when vulnerabilities are targeted, he suggested.

It’s essential for organsiations to keep information and data secure as more is done in an online, virtual world, but it’s harder when there’s a general lack of awareness of the threat landscape, he added.

“New cyber threats emerge every second, it seems. That’s why it’s important to keep your skills current,” Muhammad explained.

Providers like CBT Nuggets offer beginner-to-advanced security training focusing on the requirements of technologies from vendors including Cisco, Fortinet, Hashicorp and Microsoft.

“Ransomware and phishing are fast becoming major concerns as digital transactions increase and human error becomes more costly,” he said.

“Companies of all sizes can experience financial loss and (loss of) the trust of their customers.”

All computer systems, networks, and infrastructures require defences against unauthorised access, which can be a vector for malware attacks, phishing, man-in-the-middle attacks, SQL injection, denial of service (DoS), insider threats, zero-day exploits, and more.

Physical cyber and IoT systems have evolved to present additional vulnerabilities. This can be down to limited capabilities, including around control, and untrustworthy components, Muhammad wrote on the CBT Nuggets blog, which you can read in full here.

Recent Articles

Arista warns SMBs to take precautions against edge threats

Arista Networks, the vendor of Arista Edge Threat Management (ETM) has warned that SMBs aren't always aware of the extent of targeting...

Instructure rolls out iWork update for Canvas LMS users on Apple

Learning management software company Instructure has taken the covers off an Apple iWork update for its Canvas learning management system (LMS).

E-learning player iSpring adds six integrations for its LMS platform

Customers of the iSpring Learn learning management system (LMS) can now connect to no less than six additional platforms with a view...

What’s new in JetBrains code analyser Qodana 2023.2

The code-quality platform Qodana, new from a cornucopia of JetBrains developer tools, now boasts server-side analysis integrated with the 2023.2 releases of...

N-able leads RMM field across multiple awards programmes

Remote monitoring and management (RMM) provider N-able has taken two more coveted titles for 2023, including a prestigious CRN award for the...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox