IT professionals this year sought guidance on how to identify ransomware attacks and fix vulnerabilities in their systems and software. In ITPro Today’s most-read articles about threat management, we examined how cybersecurity approaches are adapting to new categories of threats.
Review our top 10 articles about threat management for tips, best practices, and insight into trends.
1. Fake Windows Updates Trick Users Into Installing Ransomware
ITPro Today contributor Brien Posey reported on ransomware that spreads via fake Windows updates. This article explains what to look out for and best practices for protecting users.
Further Reading: Ransomware Security for IT Pros: 2022 Report
2. Accelerometer Data and Its Security Implications
Accelerometers, which detect motion in smartphones, can reveal a surprising amount of data about users’ behavior. Learn how accelerometer data can be creatively exploited and could eventually be used to improve security.
3. How to Spot the Warning Signs of Ransomware Attacks
If you look for it, you can often detect the early signs of a ransomware attack in progress. This article outlines the indicators of both an automated or human-operated ransomware infection.
4. Why Providers Are Retooling Cybersecurity Awareness Training
ITPro Today contributor Karen D. Schwartz reported on why traditional cybersecurity training methods are failing. New methods have emerged that center on a better understanding of human risk.
Further Reading: How Leidos Tackled Cybersecurity Skills Shortage Through Education
5. How To Prevent Software Vulnerabilities in Commercial Applications
Software vendors can’t be fully entrusted to eliminate vulnerabilities in their products. As a result, organizations must take up additional security measures in case their vendors drop the ball.
Further Reading: The State of Software Security Testing Tools in 2022
6. 5 Types of Cybersecurity Skills That IT Engineers Need
As the threat landscape becomes increasingly complex, it’s more important than ever that IT engineers understand cybersecurity. This explainer describes the tools, skills, and knowledge IT engineers should have.
7. 6 Mobile Security Tips for Hybrid Workforces
Security breaches on smartphones pose a significant threat to organizations in all industries. These six tips aim to help organizations rethink their mobile security strategies.
Further Reading: Mobile Threats Skyrocket
8. 70 Percent of Breached Passwords Still in Use
SpyCloud's 2022 Identity Exposure Report raised the alarm about the number of compromised passwords that remain in use. The findings highlighted poor password hygiene and the need for better practices and individual behavior.
9. Secure Open Source Software Is Helping Enterprises Find Their Edge
The use of open source software has both empowered organizations and left them vulnerable to software threats. Find out what the Open Source Security Foundation is doing to make open source secure.
Further Reading: The Securing Open Source Software Act Highlights Growing Risks
10. Key Application Security Metrics Show Few Signs of Improvement
Organizations are slow to respond to security vulnerabilities, according to a NTT Application Security report released in February. This article from ITPro Today’s sister site Dark Reading details the causes for this concerning trend.
What are your 2023 predictions for enterprise threat management? Share your predictions in the comments below!