Tag: BitSight Security Ratings Blog

What Ransomware Trends Mean for Your Vendor Risk Program

This article has been indexed from BitSight Security Ratings Blog The last two years have introduced new challenges to organizations across the globe — from managing business operations through an ongoing pandemic; to a rapid-fire pivot to a digital mode…

3 Reasons for Attack Surface Scanning

This article has been indexed from BitSight Security Ratings Blog Taking back control of your network in light of hackers’ growing sophistication can be time-consuming. Even well-established organizations with money to spend on solid cybersecurity programs are still falling victim…

Moody’s: Cyber Risk Quantification Is Credit Positive

This article has been indexed from BitSight Security Ratings Blog We are excited to announce the availability of the Moody’s Investor Services 2022 Cyber Risk Outlook. The report, which leverages data provided by BitSight, outlines factors shaping the landscape for…

4 Best Practices to Protect your Organization from Risk

This article has been indexed from BitSight Security Ratings Blog If your organization is entering into a relationship with a vendor or partner, due diligence is key to mitigating third-party risk. Due diligence allows risk management and compliance teams to…

BitSight Algorithm Update: What You Should Know

This article has been indexed from BitSight Security Ratings Blog BitSight is committed to creating trustworthy, data-driven, and actionable measurements of organizational cybersecurity performance. As part of this commitment, BitSight periodically makes improvements to our ratings algorithm. These updates often…

Healthcare IT Security: 3 Best Practices

This article has been indexed from BitSight Security Ratings Blog Hospitals, doctors’ networks, insurance companies, and other healthcare organizations are guardians of valuable protected health information (PHI). As such they are particularly vulnerable to cyber attacks – and these threats…

4 Ways to Combat Modern Threats in Financial Services

This article has been indexed from BitSight Security Ratings Blog The financial services sector is one of the highest performing in terms of cybersecurity. One factor that contributes to this performance is regulation. Laws such as FFIEC IT, the Gramm-Leach-Bliley…

What is Network Segmentation Cyber Security

This article has been indexed from BitSight Security Ratings Blog These days, we often hear the word “quarantine” in everyday conversations–but quarantining takes on a different meaning when it comes to protecting your network.  Often, when we discuss quarantining from…

Enabling Global Investors To Make Better Risk Decisions

This article has been indexed from BitSight Security Ratings Blog Cybersecurity is a critical risk that can materially impact a company’s bottom line. Unfortunately, investors are largely in the dark when it comes to understanding the cybersecurity of the companies…

TLS/SSL Management Issues Increase Healthcare Ransomware Risk

This article has been indexed from BitSight Security Ratings Blog Recent BitSight research shows that 76% of healthcare organizations may be at increased risk of ransomware attacks due to poor TLS/SSL configuration management. TLS/SSL certificate and configuration management presents a…

4 Best Practices for Supply Chain Cyber Risk Management

This article has been indexed from BitSight Security Ratings Blog Cyber risk management should be a priority for any organization. And while there are many measures your business can take to reduce cybersecurity risk across the enterprise, how do you…

What Can Ransomware Do? How You Can Protect Your Organization

This article has been indexed from BitSight Security Ratings Blog Ransomware is rapidly becoming the most common form of cyberattack. According to the Verizon 2021 Data Breach Investigations Report, ransomware incidents have doubled year-over-year with headline-grabbing consequences.  Read the original…

Fortinet Leak Demonstrates TLS/SSL Vulnerability Risk

This article has been indexed from BitSight Security Ratings Blog In early September, a threat actor leaked nearly 500,000 Fortinet VPN login names and passwords that were allegedly scraped from vulnerable devices last summer. The leaked credentials could allow hackers…

How to Make a Successful Case for Cybersecurity Funding

This article has been indexed from BitSight Security Ratings Blog With cyberattacks on the rise, security investments are more important than ever. Still, the pandemic has forced many organizations to reconsider how they allocate their IT dollars. Between the new…

5 Steps to Creating a Cyber Security Roadmap

This article has been indexed from BitSight Security Ratings Blog The recent rise in ransomware attacks and business-halting data breaches has made it clear that your organization must prioritize cyber security performance. But ad hoc security controls and defensive measures…

5 Steps to Creating a Cyber Security Roadmap

This article has been indexed from BitSight Security Ratings Blog The recent rise in ransomware attacks and business-halting data breaches has made it clear that your organization must prioritize cyber security performance. But ad hoc security controls and defensive measures…

4 Tips for Reducing Your Company’s Cyber Exposure

This article has been indexed from BitSight Security Ratings Blog If your organization is like many others, its cyber exposure continues to grow over time. During the pandemic, as attackers sought to exploit unprecedented changes in work environments, 35% of…

4 Tips for Reducing Your Company’s Cyber Exposure

This article has been indexed from BitSight Security Ratings Blog If your organization is like many others, its cyber exposure continues to grow over time. During the pandemic, as attackers sought to exploit unprecedented changes in work environments, 35% of…

Need To Know About The Kaseya Ransomware Attack

This article has been indexed from BitSight Security Ratings Blog It happened again – another disruptive ransomware attack. On July 2, 2021 Kaseya, a Florida-based software provider that provides Remote Management Monitoring, warned of its software being abused to deploy…

What Is Cybersecurity Compliance? An Industry Guide

This article has been indexed from BitSight Security Ratings Blog If you operate in specific sectors, cybersecurity maturity is more than a best practice, it’s a regulatory requirement. These regulations are complex and constantly changing. To help you better understand…

What Is Cybersecurity Compliance? An Industry Guide

This article has been indexed from BitSight Security Ratings Blog If you operate in specific sectors, cybersecurity maturity is more than a best practice, it’s a regulatory requirement. These regulations are complex and constantly changing. To help you better understand…

A Deep Dive into the Digital Operational Resilience Act

This article has been indexed from BitSight Security Ratings Blog The European Union (EU) will soon launch a new regulation that will require banks and firms in the global financial industry to mature their third-party risk management programs to include…

How to Conduct a Cloud Security Audit: A 5-Step Checklist

This article has been indexed from BitSight Security Ratings Blog For the first time, cloud security breaches and incidents are more commonplace than on-premises attacks. According to the 2021 Verizon Data Breach Investigations Report (DBIR), in 2020, 73% of cyberattacks…

What are Software Supply Chain Attacks?

This article has been indexed from BitSight Security Ratings Blog Software supply chain attacks have become increasingly prevalent over the last couple of years. Noted as the first large-scale attack in recent months, the SolarWinds data breach wreaked havoc on…

Nobelium Attack Highlights Risk of Exposed Credentials

This article has been indexed from BitSight Security Ratings Blog Microsoft recently announced that the threat actor Nobelium continues to target government agencies, think tanks, consultants, and non-government organizations with cyber attacks.  Read the original article: Nobelium Attack Highlights Risk…

How to Conduct a Supply Chain Risk Assessment at Scale

This article has been indexed from BitSight Security Ratings Blog Vendors and third party partners are essential to helping your business grow and stay competitive. But outsourcing to third parties also dramatically increases your attack surface. A recent independent study…

What is Security Orchestration, Automation and Response (SOAR)?

A couple of years ago, industry research firm Gartner introduced a new acronym—SOAR—into the cybersecurity nomenclature. SOAR stands for “security orchestration, automation, and response.” It’s not an individual tool, or even set of tools. Like ISO 27001, GDPR, FISMA, and…

Provide Cyber Risk Analysis Insights in Business Context

Now more than ever before, it’s critical to build a strategic security performance management program in which you take a risk-based, outcome-driven approach to measuring, monitoring, managing, and reporting on your organization’s cybersecurity program performance over time. Of course, in…

4 Best Practices for Attack Surface Management

Read the original article: 4 Best Practices for Attack Surface Management Accelerated by the pandemic, digital ecosystems are expanding. New ways of working remotely, and the rapid adoption of cloud technologies have increased the number of digital touch-points that employees…

Improve Your Cyber Risk Monitoring Tools

Read the original article: Improve Your Cyber Risk Monitoring Tools Whether your organization is just beginning to develop your security performance management systems, or you already have a mature and established program in place, there is always room to innovate…

5 Best Practices for Conducting Cyber Security Assessments

Read the original article: 5 Best Practices for Conducting Cyber Security Assessments Third parties are essential to helping your business grow and stay competitive. But if you’re not careful, your trusted partnerships can introduce unwanted cyber risk and overhead into…

5 Best Practices for Conducting Cyber Security Assessments

Read the original article: 5 Best Practices for Conducting Cyber Security Assessments Third parties are essential to helping your business grow and stay competitive. But if you’re not careful, your trusted partnerships can introduce unwanted cyber risk and overhead into…

Cybersecurity Controls Every Organization Needs in 2021

Read the original article: Cybersecurity Controls Every Organization Needs in 2021 The cybersecurity controls used to manage an organization’s cybersecurity program in previous years will not work against bad actors targeting networks today. Organizations rely more on cloud computing technology,…

Cybersecurity Models Explained

Read the original article: Cybersecurity Models Explained Security risk managers often face a lot of the same roadblocks, even if they’re managing programs of different sizes or in different industries. Basing security practices on well-known, and sometimes government-regulated cybersecurity models…

5 Tips to Improve Cyber Security Monitoring of Your Vendors

Read the original article: 5 Tips to Improve Cyber Security Monitoring of Your Vendors What’s the biggest struggle your vendor risk managers face when establishing cyber security monitoring processes? From sudden increases in the use of third-parties by your organization,…

What We Can Learn About Backdoor Attacks From WordPress

Read the original article: What We Can Learn About Backdoor Attacks From WordPress Millions of organizations world-wide rely on WordPress for website creation and management. In fact, currently there are over 75 million sites that use WordPress for their operations.…

What’s Covered Under Cyber Risk Insurance

Read the original article: What’s Covered Under Cyber Risk Insurance It’s not hard to justify why you need property insurance when you’re surrounded by your physical goods that you don’t want to be lost or damaged in your home or…

What’s Covered Under Cyber Risk Insurance

Read the original article: What’s Covered Under Cyber Risk Insurance It’s not hard to justify why you need property insurance when you’re surrounded by your physical goods that you don’t want to be lost or damaged in your home or…

What’s Covered Under Data Breach Insurance

Read the original article: What’s Covered Under Data Breach Insurance It’s not hard to justify why you need property insurance when you’re surrounded by your physical goods that you don’t want to be lost or damaged in your home or…