As Covid pandemic measures have pushed people and businesses increasingly online and remote, cybercriminals have pivoted as well, exploiting weaknesses in these technologies. Always a present threat, today’s exploits are now automated, pushing us to automate our defense as well. Many threats — even if larger in scale — remain the same. Phishing, credential re-use, known vulnerable components, the traditional attacks continue to provide criminals with a steady stream of access to private networks and personal data. It seems that nobody, and no company or agency, is safe from cyber theft.
What can we do? Fortunately, lessons learned from watching adversaries can also be applied to improve our defenses. Proactively looking for indicators of compromise, adding two-factor authentication, and thwarting credential re-use are easier today than ever before.
Join us as Gabe Schuyler, a cybersecurity expert now with WizIO, explains the types of computer and network vulnerabilities and how they are exploited, as well as examples of a variety of attack types and threats, why they happen and what should be done to prevent or recover from them. Gabe will close with some very practical advice on what organizations, and you, can do to be more secure against cyberthreats.