wonderfully unique software solutions

Cybersecurity training is more important than ever as risk rises, notes CBT Nuggets

Research continues to report that threats to businesses and individuals from malicious cyberattack are, if anything, intensifying.

Asif Muhammad, writing for training provider CBT Nuggets, argues that the variety and number of cybercriminality approaches are part of what’s driving the phenomenon.

“Strengthening cybersecurity defences remains a work in progress for many organisations that recognise their shortcomings but have yet to take the necessary steps,” he pointed out.

“Cybercriminals are constantly changing their cyberattacks, especially against physical cyber and IoT systems, as they present additional vulnerabilities due to limited capabilities, uncontrolled nature, and the use of potentially untrusted components.”

It follows that organisations need to shore up their defences, including with training approaches that ensure individuals are better prepared to reduce the risk and respond appropriately when vulnerabilities are targeted, he suggested.

It’s essential for organsiations to keep information and data secure as more is done in an online, virtual world, but it’s harder when there’s a general lack of awareness of the threat landscape, he added.

“New cyber threats emerge every second, it seems. That’s why it’s important to keep your skills current,” Muhammad explained.

Providers like CBT Nuggets offer beginner-to-advanced security training focusing on the requirements of technologies from vendors including Cisco, Fortinet, Hashicorp and Microsoft.

“Ransomware and phishing are fast becoming major concerns as digital transactions increase and human error becomes more costly,” he said.

“Companies of all sizes can experience financial loss and (loss of) the trust of their customers.”

All computer systems, networks, and infrastructures require defences against unauthorised access, which can be a vector for malware attacks, phishing, man-in-the-middle attacks, SQL injection, denial of service (DoS), insider threats, zero-day exploits, and more.

Physical cyber and IoT systems have evolved to present additional vulnerabilities. This can be down to limited capabilities, including around control, and untrustworthy components, Muhammad wrote on the CBT Nuggets blog, which you can read in full here.

Recent Articles

OpenText Cloud Editions aim for accelerated AI and digital transformations

Information software company OpenText has whipped the covers off its Cloud Editions (CE) 23.1, which it says will support AI adoption and...

How to prevent more fraudulent electronic transactions with Nitro

E-signatures and PDF management software vendor Nitro has conceded that fraudsters have in some cases taken advantage of e-transaction practices, pointing out...

Vendors must clarify how they’re protecting passwords and data, says Keeper CTO

People might now be wondering about the protection on offer from secure vaults and password management providers after the LastPass data breaches,...

All data should be encrypted as data breaches can be unavoidable, warns CoSoSys

CoSoSys - maker of data loss prevention (DLP) software Endpoint Protector - has warned that encryption should be deployed regardless of data...

Nemetschek looks to advanced construction with digital twin, AI and machine vision

Germany's Nemetschek Group, whose brands include SaaS-based AEC project platform Bluebeam, is throwing its weight behind the digital twin concept with a...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox