According to a report by cybersecurity firm Kaspersky, 89% of Indian organisations have suffered cyber incidents in the last two years, with 20% of these incidents caused by the use of shadow IT. Globally, the use of shadow IT by employees has caused cyber incidents in 11% of organisations over the same time period. Shadow IT refers to the use of IT infrastructure outside of the control of a company’s IT and information security departments, including software, applications, unsolicited devices, and public cloud services. The report warns that the use of shadow IT by employees, especially with the increasing trend towards remote and distributed workforces, puts organisations at a high risk of cyber incidents. The study also revealed that the IT industry has been the hardest hit by shadow IT incidents, followed by critical infrastructure, transport, and logistics organizations. To mitigate the risks of shadow IT, the report recommends building cooperation between the business and IT departments, regularly conducting inventories of IT assets, implementing access control systems, providing training programs to improve employee information security literacy, and deploying products and solutions to limit the use of unsolicited apps and websites.
Employee’s Secret IT Habits: A Cyber Attack Waiting to Happen!
Latest from Blog
Secure solar power with effective cybersecurity for renewable energy success
TLDR: Solar energy systems are vulnerable to outside attacks through inverters, microgrids, and DoS attacks. Cybersecurity professionals can protect solar energy by teaching security, updating software, and setting up a strong firewall.
Health sector cyberattacks Critics slam federal response as weak and disjointed
TLDR: Health care is the most frequent target for ransomware attacks. Federal response to cyberattacks in the health industry is criticized as feeble and fractured. Health care industry faced numerous cyberattacks, including
Beware: UNC2970 Hackers Weapons in Job Seekers’ PDFs
TLDR: UNC2970 hackers are targeting job seekers with weaponized PDF files. They use sophisticated phishing tactics to deliver malware to victims. In a recent report, cybersecurity analysts at Google Mandiant have identified
Cyber insurance changes shape of security for good and bad
TLDR: Key Points: Cyber-insurance landscape is shifting to encourage greater cyber resiliency Rising costs of cyberattacks are prompting insurers to re-examine underwriting How Cyber-Insurance Shifts Affect the Security Landscape The article discusses
CMS warns nearly 1 million Medicare members of 2023 MOVEit breach
TLDR: 946,801 Medicare beneficiaries notified of May 2023 MOVEit breach Protected health and personal information compromised In September 2024, the Centers for Medicare & Medicaid Services (CMS) disclosed that nearly a million
BMW i invests in cybersecurity firm safeguarding software seamlessly
TLDR: BMW i Ventures invests $12 million in cybersecurity firm RunSafe Security RunSafe Security specializes in protecting software from cyberattacks without disruption Key Points: BMW i Ventures recently announced a $12 million
Chinese U Competition Hacks Real Victim: A Targeted University?
“`html TLDR: A Chinese hacking competition at Northwestern Polytechnical University raised suspicions of targeting a real victim. Participants were required to keep activities secret, delete backdoors, and sign a legal responsibility document.
GSMA to Implement Full Encryption for RCS Messaging Platforms
TLDR: The GSM Association (GSMA) is working on implementing end-to-end encryption (E2EE) for messages sent between Android and iOS ecosystems. RCS, an upgrade from SMS, is currently not E2E encrypted, prompting Google
Geopolitical stress rises, Iran’s cyber prowess expands
TLDR Iran’s cyber operations are growing, targeting regional allies and enemies APT34, APT33, Lemon Sandstorm, and Charming Kitten are some of the Iranian cyber groups involved in recent attacks In the midst
Russia’s wartime cyber espionage: a strategic game of cards
TLDR: Key Points: Russian cyber operations in wartime focus on espionage, sabotage, and disinformation. Russian cyber attacks target Ukraine’s government, critical infrastructure, and allied countries. In the realm of modern warfare, cyber-espionage