Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

October 2023

Protect yourself against digital draculas this Halloween: Avoid AI-driven cyber trickery

As Cybersecurity Awareness Month winds down and you prepare for Halloween festivities like trick-or-treating and pumpkin carving, don't forget to protect against real-world monsters: artificial intelligence-driven cyber threats. Here are a few steps that may help ward off such threats like garlic protects against Dracula: Taking precautionary steps against them may keep the real monsters at bay!

Healthcare - Navigating your path to cyber wellness

The healthcare industry is progressing towards a more mature cybersecurity posture. However, given it remains a popular attack target, more attention is needed. Results from The Cost of a Data Breach Report 2023 reported that healthcare has had the highest industry cost of breach for 13 consecutive years, to the tune of $10.93M. In 2022, the top 35 global security breaches exposed 1.2 billion records, and 34% of those attacks hit the public sector and healthcare organizations.

Ensuring robust security of a containerized environment

In today’s rapidly evolving digital landscape, containerized microservices have become the lifeblood of application development and deployment. Resembling miniature virtual machines, these entities enable efficient code execution in any environment, be it an on-premises server, a public cloud, or even a laptop. This paradigm eliminates the criteria of platform compatibility and library dependency from the DevOps equation.

Social engineering: Hacking minds over bytes

In this blog, lets focus on the intersection of psychology and technology, where cybercriminals manipulate human psychology through digital means to achieve their objectives. Our world has become more interconnected over time, and this has given rise to an entirely new breed of criminal masterminds: digital criminals with deep psychological insights who use technology as the ultimate battlefield for social engineering activities.

How to establish a great security awareness culture

As we mark another Cybersecurity Awareness Month, it's essential to recognize that this is more than a calendar event; it's a wake-up call for proactive vigilance in the digital age. In an environment rife with technological threats, the cornerstone of robust cybersecurity isn't just advanced systems and firewalls—it's informed and empowered individuals. There are three most important insights organizations can learn before implementing any cybersecurity awareness-raising campaign.

Business continuity planning: Looking back or ahead

In September 2023, cybercriminals launched an extensive ransomware attack that disrupted several major businesses in the Las Vegas Casino Business/District. The attack shook the city and stopped consumer goods and services for several hours. The attack influenced security, visitor services, and financial activities. Businesses lost money and long-term reputational risks ensued.

Why are organizations failing to detect cybersecurity threats?

With the changing security landscape, the most daunting task for the CISO and CIO is to fight an ongoing battle against hackers and cybercriminals. Bad actors stay ahead of the defenders and are always looking to find new vulnerabilities and loopholes to exploit and enter the business network. Failing to address these threats promptly can have catastrophic consequences for the organization.

Get the AT&T Cybersecurity Insights Report: Focus on Retail

We’re pleased to announce the availability of the 2023 AT&T Cybersecurity Insights Report: Focus on Retail. The report examines the edge ecosystem, surveying retail IT leaders from around the world, and provides benchmarks for assessing your edge computing plans. This is the 12th edition of our vendor-neutral and forward-looking report. Last year’s focus on retail report documented how we secure the data, applications, and endpoints that rely on edge computing (get the 2022 report).

Re-evaluating risk in the artificial intelligence age

It is common knowledge that when it comes to cybersecurity, there is no one-size-fits all definition of risk, nor is there a place for static plans. New technologies are created, new vulnerabilities discovered, and more attackers appear on the horizon. Most recently the appearance of advanced language models such as ChatGPT have taken this concept and turned the dial up to eleven.

Strengthening Cybersecurity: Force multiplication and security efficiency

In the ever-evolving landscape of cybersecurity, the battle between defenders and attackers has historically been marked by an asymmetrical relationship. Within the cybersecurity realm, asymmetry has characterized the relationship between those safeguarding digital assets and those seeking to exploit vulnerabilities.

5G's role in telemedicine: The future is now

Healthcare and technology have always gone hand in hand. Telemedicine, which lets you talk to doctors without visiting them in person, is a great example. A few years back, it might have sounded like science fiction. But today, it's a regular part of many people's lives. In fact, data shows that 80% of people have used telemedical services at least once in their lives.

Stories from the SOC: Quishing - Combatting embedded malicious QR codes

Over the past several months, AT&T Managed Detection and Response (MTDR) security operations center (SOC) analysts have seen an increase in the usage of phishing emails containing malicious QR codes. In a recent example, a customer that was victimized by a phishing attempt provided the AT&T analysts with an email that was circulated to several of its internal users.

Cybersecurity Awareness Month: School habits to protect you and your family

Back to school is a great time to remember basic cybersecurity best practices to protect you and your family. These won’t surprise anyone who’s been parenting for the last few years, but what might surprise you is how fast things are changing, which can increase your risk of giving access to cyber criminals. That is mostly around all the applications, and even micro-applications, that most frequently provide the lowest levels of security.

Gartner predicted APIs would be the #1 attack vector - Two years later, is it true?

Over the last few years, APIs have rapidly become a core strategic element for businesses that want to scale and succeed within their industries. In fact, according to recent research, 97% of enterprise leaders believe that successfully executing an API strategy is essential to ensuring their organization’s growth and revenue.

The role of automation in mitigating cybersecurity risks

Cyberattacks are on the rise around the globe. Recent data suggest that there are 2,200 cyberattacks every day and that the average cost of a data breach is $9.44 million. Of those cyberattacks, 92% are delivered via email in the form of malware and phishing. In 2022 alone, businesses reported 255 million phishing attacks with an average cost of $4.91 million.

Strengthening Cybersecurity for small and medium-sized businesses: The importance of Security Orchestration, Automation, and Response (SOAR)

In today's increasingly complex threat landscape, small and medium-sized businesses (SMBs) face significant challenges in protecting their assets and reputation from cyber threats. We will explore the benefits of SOAR, its role in enhancing security operations, and its ability to mitigate risks, streamline incident response, and protect valuable business assets.

AT&T Cybersecurity: championing global cybersecurity education & awareness

In an era dominated by technological evolution, Cybersecurity Awareness Month 2023, now celebrating its 20th year, accentuates the growing significance of cybersecurity. This initiative encourages individuals and organizations to embrace crucial cybersecurity measures to help with online safety. AT&T Cybersecurity once again demonstrates its commitment to this cause by actively participating in this pivotal educational month.