wonderfully unique software solutions

Cybersecurity training is more important than ever as risk rises, notes CBT Nuggets

Research continues to report that threats to businesses and individuals from malicious cyberattack are, if anything, intensifying.

Asif Muhammad, writing for training provider CBT Nuggets, argues that the variety and number of cybercriminality approaches are part of what’s driving the phenomenon.

“Strengthening cybersecurity defences remains a work in progress for many organisations that recognise their shortcomings but have yet to take the necessary steps,” he pointed out.

“Cybercriminals are constantly changing their cyberattacks, especially against physical cyber and IoT systems, as they present additional vulnerabilities due to limited capabilities, uncontrolled nature, and the use of potentially untrusted components.”

It follows that organisations need to shore up their defences, including with training approaches that ensure individuals are better prepared to reduce the risk and respond appropriately when vulnerabilities are targeted, he suggested.

It’s essential for organsiations to keep information and data secure as more is done in an online, virtual world, but it’s harder when there’s a general lack of awareness of the threat landscape, he added.

“New cyber threats emerge every second, it seems. That’s why it’s important to keep your skills current,” Muhammad explained.

Providers like CBT Nuggets offer beginner-to-advanced security training focusing on the requirements of technologies from vendors including Cisco, Fortinet, Hashicorp and Microsoft.

“Ransomware and phishing are fast becoming major concerns as digital transactions increase and human error becomes more costly,” he said.

“Companies of all sizes can experience financial loss and (loss of) the trust of their customers.”

All computer systems, networks, and infrastructures require defences against unauthorised access, which can be a vector for malware attacks, phishing, man-in-the-middle attacks, SQL injection, denial of service (DoS), insider threats, zero-day exploits, and more.

Physical cyber and IoT systems have evolved to present additional vulnerabilities. This can be down to limited capabilities, including around control, and untrustworthy components, Muhammad wrote on the CBT Nuggets blog, which you can read in full here.

Recent Articles

LastPass analyst warns of looming credentials crisis

Organisations should beware of an oncoming crisis in the secure management of user access, according to a cybersecurity specialist at password management...

Octopus Deploy follows Codefresh buy with 2024.1 Server

Continuous delivery (CD) pipeline platform vendor Octopus Deploy has acquired fellow development software specialist Codefresh and rolled out a new version of...

Top-25 cloud list runs gamut from Visma to Cloudflare, Wasabi to Azul

The Software Report market insights website has named 25 software companies as the top companies in cloud computing for 2024, offering specific...

TeamViewer partners Deloitte on digital visuals for warehouse logistics

Deloitte and TeamViewer have combined the latter's augmented reality (AR) based visual picking offering with SAP Extended Warehouse Management (EWM) for warehousing...

Hornetsecurity expands M365 cloud security offer with Vade deal

Cloud email security provider Hornetsecurity has added a partnership with Vade, increasing focus on answering data sovereignty requirements with best-in-class cloud, compliance...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox