Okta cyber security attack: Supply chain attacks on the rise

Okta cyber attack: cloud security Supply chain attacks

Analysing Okta cyber attack and what you should do if your business has been affected Organisations that use Okta to provide access to their networks have been affected by a cyberattack conducted by the hacking group Lapsus$. Okta said that in a worst-case scenario, 366 of its clients had been compromised and their “data may have been viewed or acted … Read More

Top 3 Ransomware Examples and what can we learn from them

Top 3 Ransomware Examples and what can we learn from them

Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they expose networks to ransomware, creating devastating losses that undermine their reputations.  In fact, the past year has seen ransomware attacks take down massive corporations with sophisticated networks. We will explore some ransomware examples and explain what to do to prevent such … Read More

Understanding the cyber risks of the LDAP protocol

Understanding the cyber risks of the LDAP protocol

The Lightweight Directory Access Protocol (LDAP protocol) is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network.  LDAP is a client-based lightweight version of Directory Access Protocol (DAP). It operates on both private intranets and public networks, and across multiple directory services which makes it the most convenient for authenticating, … Read More

Why a Cyber Security Posture Assessment is a must?

Why you should conduct a cyber security Posture Assessment

Why you should assess you cyber security posture? To figure out whether you need a security posture assessment, let’s first look at some facts. As enterprises move to the cloud, tens and thousands of assets are being migrated to cloud storage servers. In fact, according to a recent study, 61% of companies made the switch to the cloud in 2021 … Read More

How to use NIST SP 800-61 guide to be better prepared for third-party risk

How to use NIST SP 800-61 guide for third-party risk?

As your business grows, so does its third-party ecosystem. But with growth comes a greater sense of responsibility which entails increasing cybersecurity measures and protecting your company against cyberattacks. Ensuring your organisation’s cyber defences are at an optimal level is paramount in today’s digital age to protect against technology outages, credential and data exposures, denial-of-service attacks, ransomware, and other threats. Here … Read More

Why is the number of cyber attacks during holidays growing?

RiskXchange Why are cyber risks on the rise during the holiday season RiskXchange The leader in Third-Party Cyber Risk Management

As the holiday season draws closer, the retail and logistics industry can expect a significant increase in activity and revenue as customers flock to websites and physical stores to complete their shopping. But so does increase the risk of cyber attacks during holidays. Studies show that holiday shopping in 2021 will grow by 8.1% in sales, marking a significant rise … Read More

Cyber supply chain risk management (C-SCRM) best practices for 2022

RiskXchange Cyber supply chain risk management C SCRM best practices for 2022 RiskXchange The leader in Third-Party Cyber Risk Management

RiskXchange fights cyber threats by providing instant risk ratings for any company across the globe. Cyber supply chain risk management (C-SCRM) is the process of identifying, understanding, and mitigating cyber risks that threaten your organisation’s extended supply chain. Managing cyber risk within your supply chain includes taking precautionary measures to secure your organisation against attacks, as well as mitigating the … Read More

Top 5 cyber risks for insurance companies

RiskXchange Top 5 cyber risks for insurance companies RiskXchange The leader in Third-Party Cyber Risk Management

Today, the cybersecurity landscape finds insurance companies struggling to fend off aggressive and costly cyberattacks as cybercriminals breach traditional defences with sophisticated and unprecedented attack methods, which poses significant cyber risks for insurance companies. Before the pandemic, an average insurance company would face over 113 cyberattacks per year, with a handful of incidents proving successful in breaching their defences. Since … Read More

Understanding the difference between ransomware attack and data breach

Riskxchange Understanding the differences between ransomware attacks and data breaches RiskXchange The leader in Third-Party Cyber Risk Management

RiskXchange uses data-driven insights to prevent ransomware attacks and data breaches in your organisation. Data breaches and ransomware attacks are two completely different kinds of hacks which are increasing worldwide. However, the line between the two has somewhat narrowed of late. What is the difference between ransomware attack and data breach? Let’s take a look at both. What is a … Read More