wonderfully unique software solutions

Cybersecurity training is more important than ever as risk rises, notes CBT Nuggets

Research continues to report that threats to businesses and individuals from malicious cyberattack are, if anything, intensifying.

Asif Muhammad, writing for training provider CBT Nuggets, argues that the variety and number of cybercriminality approaches are part of what’s driving the phenomenon.

“Strengthening cybersecurity defences remains a work in progress for many organisations that recognise their shortcomings but have yet to take the necessary steps,” he pointed out.

“Cybercriminals are constantly changing their cyberattacks, especially against physical cyber and IoT systems, as they present additional vulnerabilities due to limited capabilities, uncontrolled nature, and the use of potentially untrusted components.”

It follows that organisations need to shore up their defences, including with training approaches that ensure individuals are better prepared to reduce the risk and respond appropriately when vulnerabilities are targeted, he suggested.

It’s essential for organsiations to keep information and data secure as more is done in an online, virtual world, but it’s harder when there’s a general lack of awareness of the threat landscape, he added.

“New cyber threats emerge every second, it seems. That’s why it’s important to keep your skills current,” Muhammad explained.

Providers like CBT Nuggets offer beginner-to-advanced security training focusing on the requirements of technologies from vendors including Cisco, Fortinet, Hashicorp and Microsoft.

“Ransomware and phishing are fast becoming major concerns as digital transactions increase and human error becomes more costly,” he said.

“Companies of all sizes can experience financial loss and (loss of) the trust of their customers.”

All computer systems, networks, and infrastructures require defences against unauthorised access, which can be a vector for malware attacks, phishing, man-in-the-middle attacks, SQL injection, denial of service (DoS), insider threats, zero-day exploits, and more.

Physical cyber and IoT systems have evolved to present additional vulnerabilities. This can be down to limited capabilities, including around control, and untrustworthy components, Muhammad wrote on the CBT Nuggets blog, which you can read in full here.

Recent Articles

Agreement management vendor DocuSign to add AI with Lexion buy

Cloud documentation management software company DocuSign has agreed to acquire Lexion, rolling the latter's AI capabilities into its DocuSign Intelligent Agreement Management...

LastPass urges SMBs to tackle human cyber vulnerabilities

SMBs are more proactive yet still aren't patching cybersecurity gaps caused by the "human factor" -- that is, based on human psychology...

Four core GFI business manager applications add AI co-pilot

GFI Software has integrated AI co-pilot capabilities into four of its key business-focused applications with a view to optimised network performance and...

Extended detection and response (XDR) has become vital, says Stormshield

Extended detection and response technologies (XDR) have become a vitally important shield for all companies, according to sovereignty focused data, network and...

Is OSCP or CEH the best security certification for staff? CBT Nuggets explains

Deciding between Offensive Security Certified Professional (OSCP) and Certified Ethical Hacker (CEH) cybersecurity skills certifications can be "make or break" for staff,...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox