The Top Cyber Attacks of October 2021

October marked a dubious milestone for cybersecurity. A report from the Identity Theft Research Center confirmed that the number of cyber attacks reported through the first nine months of the year exceeded the total recorded for the entirety of 2020. And not by a small margin either—attacks are up 17% in 2021 compared to last year. Clearly, hackers have been busy, as have the cybersecurity experts tasked with mitigating the damage.

5 Key Cyber Regulatory Predictions for 2022

Cybersecurity regulations were long viewed as an esoteric afterthought, even as technology exploded into every corner of our lives. But that's no longer the case, as governments and businesses seek to get a better grip on privacy regulations and data protections. At Egnyte, we track legal and regulatory trends closely so we can better serve our customers and respond to changes. Based on those observations, here are our cybersecurity regulation predictions for 2022.

SharePoint and Office 365 compliance & data classification with cp.Discover

Discover, Classify, and Protect your most Sensitive data. Find critical data in local and remote file shares such as Microsoft SharePoint, Office 365, AWS or Azure and create custom sensitive data rules to locate and classify intellectual property and other sensitive data specific to your business.

Recommendations for Fulfilling the Potentials of Cyber Insurance

Cyber insurance has great potentials in improving cybersecurity practices and protecting organizations against the impact of security incidents, but these potentials “have yet to fully materialize.” This is the key highlight of a recent report developed by the Royal United Services Institute for Defence and Security Studies (RUSI) and the University of Kent in the UK. The report provides a comprehensive list of recommendations for both governments and organizations.

10 Predictions About Cybersecurity Threats in 2022

The number of ransomware attacks continues to grow, and that trend will likely continue in 2022. Organizations will be attacked, files will be encrypted, and victims will need to decide whether to pay ransom or try to implement expensive and painful recovery techniques on their own. That much, unfortunately, should come as no surprise, but what will be different is how those attacks are carried out.

Taking A Unified Approach to Delivering Wi-Fi Connectivity and Security

Nowadays, teleworking or following a hybrid work model has become commonplace. The question we need to ask ourselves is, is our remote connection secure? The National Security Agency (NSA) in the United States has published a best practices info sheet for government workers and contractors working in areas related to national security and defense. info sheet supplies advice on how to avoid cyberattacks due to a compromised or unsecured wireless connection.