Banks to compete in cyber tournaments to raise security awareness

Banks to compete in cyber tournaments to raise security awareness

Banks are set to engage in a series of tournaments and events to raise awareness around cyber issues, Finextra has claimed.

#7 Almerindo Graziano, C.E.O at Cyber Ranges


CYBER RANGES delivers world-class cyber security training and capability development exercises using next-generation technology and services for the design, delivery, and management of simulation-based, deep-dive experiences in cybersecurity.

In this episode, Almerindo Graziano will share his insights and experiences in the industry and discuss how CYBER RANGES is leading the way in developing the next generation of cybersecurity professionals.

Cybersecurity awareness : what stakes are, everybody is involved


From Conscio Technologies library, the video presents what is at stake about cybersecurity. It can de seen as an introduction of the topic.

TOP 10 CYBER ATTACKS DOCUMENTARY


There have been numerous cyber attacks in recent years, and it’s difficult to rank them definitively. However, here are ten significant cyber attacks that have caused significant damage:

WannaCry ransomware attack (2017): This ransomware attack affected more than 200,000 computers in 150 countries. It encrypted files and demanded a ransom in bitcoin for the files to be decrypted.

Equifax data breach (2017): This data breach affected 143 million customers’ personal information, including Social Security numbers, birth dates, and addresses.

Yahoo data breaches (2013-2014): In what was one of the largest data breaches in history, Yahoo announced that all three billion of its user accounts were compromised in 2013 and 2014. The data stolen included email addresses, phone numbers, and birth dates.

Target data breach (2013): In this breach, hackers stole credit card and personal information from 110 million Target customers.

Sony Pictures hack (2014): The hack of Sony Pictures resulted in the leak of private emails and personal information of employees. It was reportedly carried out by a group affiliated with North Korea.

JPMorgan Chase data breach (2014): Hackers stole the personal information of 83 million JPMorgan Chase customers, including names, addresses, and phone numbers.

NotPetya ransomware attack (2017): This ransomware attack spread through Ukraine and then quickly spread to other countries, causing billions of dollars in damage to businesses worldwide.

Stuxnet attack (2010): Stuxnet was a highly sophisticated computer worm that targeted Iran’s nuclear program. It was reportedly developed jointly by the United States and Israel.

Anthem data breach (2015): This data breach affected 80 million Anthem customers and resulted in the theft of personal information, including Social Security numbers and birth dates.

OPM data breach (2015): This data breach of the U.S. Office of Personnel Management affected 22 million current and former federal employees. Personal information, including Social Security numbers and fingerprints, was stolen.

Note that this list is not exhaustive and is in no particular order. There have been many other significant cyber attacks, and the threat of cyber attacks continues to evolve and grow in complexity.

PLEASE LIKE AND SUBSCRIBE IF YOU ENJOY OUR CONTENT!

Security Awareness Episode 1: Passwords


Adobe, the National Cyber Security Alliance, and Speechless have partnered to bring you a series of security awareness videos. The plan is to release one video every other month starting November 2019. A total of eight videos will be released.  

The first video of the video series is on passwords. The key points mentioned, if implemented throughout the organization can dramatically reduce risk of compromise. There are key takeaways stated at the end of the video, but there are some more subtle points as well: 

1. Use a password manager. They are many to choose from and some are free. A password manager can assist in automating the fixes to the below mentioned threats.  

2. Don’t write or print passwords on paper or in unsecured digital files. For example, a sticky note with the password on the backside of a laptop or a list of passwords in an unprotected excel sheet.  

3. Use long, random, but memorable passwords – also known as passphrases. For example, “Cherry Wire Sparking!” 

4. Don’t use the same password everywhere. Try to use unique passwords everywhere you login. If one website or company gets hacked, and the passwords are leaked, then all accounts using that same password are at risk.  

5. Where possible, use multi-factor authentication (MFA). If a password is known, then the second (or third) “factor” of authentication is an additional layer of protection. A good resource for checking if MFA is available on different services is https://twofactorauth.org/ 

6. Finally, properly destroy your sensitive data properly.

chevron_left
chevron_right