Understanding the difference between ransomware attack and data breach

Riskxchange Understanding the differences between ransomware attacks and data breaches RiskXchange The leader in Third-Party Cyber Risk Management

RiskXchange uses data-driven insights to prevent ransomware attacks and data breaches in your organisation. Data breaches and ransomware attacks are two completely different kinds of hacks which are increasing worldwide. However, the line between the two has somewhat narrowed of late. What is the difference between ransomware attack and data breach? Let’s take a look at both. What is a … Read More

Social engineering attacks: What is a whaling attack?

RiskXchange Protecting Your Company From A Whaling Attack RiskXchange The leader in Third-Party Cyber Risk Management

In 2016, FACC CEO Walter Stephen fell victim to a whaling attack where fraudsters used his credentials to authorise a substantial cash transfer that cost the corporation over $56 million.  In the same year, a prominent Seagate executive suffered a similar data breach, exposing employees’ W-2 forms. Over 10,000 current and former Seagate workers had sensitive information, such as their … Read More

PrintNightmare: Understanding the Windows Print Spooler vulnerability

RiskXchnage PrintNightmare Understanding the Windows Print Spooler vulnerability RiskXchange The leader in Third-Party Cyber Risk Management

RiskXchange provides full visibility over your eco-systems’ entire attack surface in near real-time to avoid vulnerabilities like PrintNightmare. Researchers at Sangfor Technologies accidentally published a proof-of-concept (PoC) exploit recently for a new and unpatched vulnerability affecting the Print Spooler service on newer versions of Windows. Although the PoC was deleted soon after its publication, the damage was already widespread. The … Read More

How can you protect your operations from a domain hijacking attack?

RiskXchange How To Prevent Domain Hijacking Attacks RiskXchange The leader in Third-Party Cyber Risk Management

In 2014, the owner of the website domain MLA.com lost all their traffic and transactions overnight because its domain name was hijacked and all visitors were redirected to a fabricated website.  In addition to lost traffic, they also lost all administrative access to the website—next to nothing could be done to resolve the issue.  While the owner eventually recovered access, … Read More

Vendor due diligence best practices we can expect to see in 2022

RiskXchange Vendor Due Diligence Best Practices In 2022 RiskXchange The leader in Third-Party Cyber Risk Management

Throughout 2020 and 2021, we saw threats to cybersecurity increase by a significant margin. This led to disastrous cyberattacks all across the world, such as the SolarWinds attack, which undermined company profitability and credibility. Social engineering attacks proved to be particularly devastating with multiple reports revealing that ransomware and phishing attacks were particularly successful in this timeframe. In 2022, we … Read More

Leveraging common vulnerabilities and exposures (CVE) to strengthen cybersecurity posture

RiskXchange Common Vulnerabilities And Exposures Database RiskXchange The leader in Third-Party Cyber Risk Management

As organisations across finance, healthcare, and logistics continue to transfer their operations to cloud-based applications, it raises concerns about third-party vendor attacks. Cyber attacks via third parties and vendors have been on the rise in recent years. Research shows over 1,767 reported data breaches in 2021, and experts claim that this number will go up within the next few years. … Read More

Best practices to improve cybersecurity posture in 2022

How To Improve Your Cybersecurity Posture RiskXchange RiskXchange The leader in Third-Party Cyber Risk Management

Cybersecurity posture or security posture is the holy grail of vendor security. It gives you a holistic perspective of your vendor security infrastructure, tells you how vulnerable you are to cyberattacks, and encourages you to use the best cybersecurity practices. With cyberattacks set to increase in 2022 and beyond, however, there are concerns over whether today’s cybersecurity posture reflects the … Read More

What is a cybersecurity assessment?

RiskXchange What Is A Cybersecurity Assessment RiskXchange The leader in Third-Party Cyber Risk Management

RiskXchange can help your organisation utilise an effective cybersecurity assessment. Cyberattacks are on the rise right around the world, so much so that the FBI reported a record increase in cybercrime complaints in 2020 – up 69% from a year earlier. The problem is so widespread that over $4.1 billion losses were reported in the United States alone last year, … Read More

How do you assess cybersecurity risk in a post-pandemic environment?

post-pandemic environment

In 2021, we’re navigating both longstanding and unique security issues that undermine the time and money invested in a robust security posture. From weakened networks compounded by poor WFH practices to sophisticated and layered phishing campaigns, there are many factors that threaten the work we do today. In fact, around 80% of senior IT employees and security leaders are convinced … Read More