<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Computer security &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/computer-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sat, 19 Dec 2020 10:42:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Computer security &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>whoswholegal &#8211; Features &#8211; Law firms as prime targets for hackers: 7 steps to reducing cyber risks</title>
		<link>https://risk-academy.ru/whoswholegal-features-law-firms-as-prime-targets-for-hackers-7-steps-to-reducing-cyber-risks/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sat, 19 Dec 2020 10:42:09 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[Law firms]]></category>
		<category><![CDATA[insurance policies]]></category>
		<category><![CDATA[Video gaming]]></category>
		<category><![CDATA[certain security tools]]></category>
		<category><![CDATA[Hackers]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/whoswholegal-features-law-firms-as-prime-targets-for-hackers-7-steps-to-reducing-cyber-risks/</guid>

					<description><![CDATA[Due to the nature of their business, law firms possess a tremendous volume of valuable documents and data, which are extremely attractive to hackers of a variety of motivations. Successful [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Due to the nature of their business, law firms possess a tremendous volume of valuable documents and data, which are extremely attractive to hackers of a variety of motivations. Successful cyber-attacks can cause a severe negative impact to a law firm’s operations and catastrophic damage to a law firm’s reputation.</p>
<p>According to the recently published 2020 <em>ABA Legal Technology Survey Report</em>, the number of law firms experiencing a known security breach increased to 29 per cent in 2020. The survey notes that “despite the ethical issues and pending challenges, the use of certain security tools remains at less than half of respondents,” and only 36 per cent of the respondents have committed to cyber insurance policies.</p>
<p>This paper seeks to help all organisations and institutions, not just law firms, better understand the threats they face and why they should work toward better cyber hygiene, and a more proactive incident and threat management strategy. First, I review why law firms are attractive cyber targets and how compromising these firms is a high priority to threat actors. I will define the concept of “cyber hygiene” and show why it is critical to maintaining IT&#8230;</p>
</div>
<p><a href="https://whoswholegal.com/features/law-firms-as-prime-targets-for-hackers-7-steps-to-reducing-cyber-risks">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Leadership: Fighting Back Against Fraud</title>
		<link>https://risk-academy.ru/cybersecurity-leadership-fighting-back-against-fraud/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 15:42:38 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[crime]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Biometrics]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Data security]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Harassment]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cybersecurity-leadership-fighting-back-against-fraud/</guid>

					<description><![CDATA[Biometrics , COVID-19 , Fraud Management &#38; Cybercrime CEOS and CISOs on Responding to the Multichannel Fraud Spike Tom Field (SecurityEditor) • December 11, 2020     &#13; &#13; &#13; [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="generic-article">
<p class="text-muted">
                      Biometrics<br />
                          ,<br />
                              COVID-19<br />
                          ,<br />
                              Fraud Management &amp; Cybercrime
                                                                                                                  </p>
<p>          <span class="article-sub-title">CEOS and CISOs on Responding to the Multichannel Fraud Spike</span><br />
        <span class="article-byline"><br />
                        Tom Field (<a href="https://www.twitter.com/SecurityEditor"><i class="fa fa-twitter"/>SecurityEditor</a>)                          •<br />
            <span class="text-nowrap">December 11, 2020</span>     </span></p>
<figure>
        <img decoding="async" title="crime" src="https://130e178e8f8ba617604b-8aedd782b7d22cfe0d1146da69a52436.ssl.cf1.rackcdn.com/cybersecurity-leadership-fighting-back-against-fraud-showcase_image-3-a-15572.jpg" alt="Cybersecurity Leadership: Fighting Back Against Fraud" class="img-responsive hidden"/><br />
              </figure>
<figure>&#13;<br />
&#13;<br />
&#13;<br />
</figure>
<p>&#13;</p>
<p><a href="https://www.inforisktoday.com/fraud-management-c-409">Fraud explodes in tough times, and do times come any tougher than they have with COVID-19? In this latest Cybersecurity Leadership panel, CEOs and CISOs describe their efforts to spot and stop emerging fraud schemes&#8230;</p>
</div>
<p><a href="https://www.bankinfosecurity.com/cybersecurity-leadership-fighting-back-against-fraud-a-15572">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber actors target K-12 distance learning education to cause disruptions and steal data &#124; 2020-12-11</title>
		<link>https://risk-academy.ru/cyber-actors-target-k-12-distance-learning-education-to-cause-disruptions-and-steal-data-2020-12-11/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Fri, 11 Dec 2020 05:40:19 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Technology Internet]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[National security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Educational technology]]></category>
		<category><![CDATA[distance learning]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cyber-actors-target-k-12-distance-learning-education-to-cause-disruptions-and-steal-data-2020-12-11/</guid>

					<description><![CDATA[Cyber actors target K-12 distance learning education to cause disruptions and steal data &#124; 2020-12-11 &#124; Security Magazine This website requires certain cookies to work and uses other cookies to [&#8230;]]]></description>
										<content:encoded><![CDATA[<div> <!--<![endif]--><br />
 <head></p>
<link href="https://www.securitymagazine.com/articles/94140-cyber-actors-target-k-12-distance-learning-education-to-cause-disruptions-and-steal-data" rel="canonical"/>
<p>  <meta name="csrf-param" content="authenticity_token"/><br />
<meta name="csrf-token" content="nL6JVpySD7rTvwaWMWHghWcbaBeEI89Asa+IVbgabLhCIykuw2W7y7Dh0Vn8tBJB4XD+C6z6qcgDmT/epU2Vaw=="/><br />
  <meta name="viewport" content="width=device-width, initial-scale=1.0"/><br />
  <meta name="description" content="A new Joint Cybersecurity Advisory, coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), assess malicious cyber actors are targeting kindergarten through twelfth grade (K-12) educational institutions, leading to ransomware attacks, the theft of data, and the disruption of distance learning services."/><br />
  <meta name="keywords" content="cyber security,malware,k-12 security,ransomware"/></p>
<link rel="alternate" type="application/xml" title="Security Magazine RSS Feed" href="https://www.securitymagazine.com/rss/articles"/>
<p>  <meta property="og:title" content="Cybercriminals targeting K-12 distance learning education to cause disruptions and steal data"/><br />
<meta property="og:description" content="A new Joint Cybersecurity Advisory, coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), assess malicious cyber actors are targeting kindergarten through twelfth grade (K-12) educational institutions, leading to ransomware attacks, the theft of data, and the disruption of distance learning services."/><br />
<meta property="og:url" content="https://www.securitymagazine.com/articles/94140-cyber-actors-target-k-12-distance-learning-education-to-cause-disruptions-and-steal-data?v=preview"/><br />
<meta property="og:image" content="https://www.securitymagazine.com/ext/resources/images/schools-remote-learning.jpg?height=635&amp;t=1604076956&amp;width=1200"/><br />
<meta property="og:image:width" content="900"/><br />
<meta property="og:image:height" content="550"/><br />
<meta property="og:type" content="Article"/><br />
<meta name="twitter:title" content="Cybercriminals targeting K-12 distance learning education to cause disruptions and steal data"/><br />
<meta name="twitter:description" content="A new Joint Cybersecurity Advisory, coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), assess malicious cyber actors are targeting kindergarten through twelfth grade (K-12) educational institutions, leading to ransomware attacks, the theft of data, and the disruption of distance learning services."/><br />
<meta name="twitter:card" content="summary"/><br />
<meta name="twitter:image" content="https://www.securitymagazine.com/ext/resources/images/schools-remote-learning.jpg?1604076956"/></p>
<p> <meta name="msapplication-TileColor" content="#FFFFFF"/><br />
<meta name="msapplication-TileImage" content="/images/favicon/mstile-144.png"/>
<link rel="icon" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/favicons.ico" sizes="16x16 32x32 48x48 64x64"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-152.png" sizes="152x152"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-144.png" sizes="144x144"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-120.png" sizes="120x120"/>
<link rel="apple-touch-icon-precomposed" type="image/x-icon" href="https://www.securitymagazine.com/images/favicon/apple-touch-icon-72.png" sizes="72x72"/>
<p><meta content="true" name="has-log-view"/><br />
  <title>Cyber actors target K-12 distance learning education to cause disruptions and steal data | 2020-12-11 | Security Magazine</title>
  <link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/stylesheets/application.css"/>
   <link rel="stylesheet" media="print" href="https://www.securitymagazine.com/stylesheets/print.css"/>
 <link rel="dns-prefetch" href="https://fonts.googleapis.com"/>
 <link rel="preconnect" href="https://fonts.gstatic.com/" crossorigin=""/>
  <link href="https://fonts.googleapis.com/css?family=PT+Serif|Open+Sans:400,700|Open+Sans+Condensed:300" rel="stylesheet"/>
<link rel="stylesheet" media="screen" href="https://www.securitymagazine.com/ext/resources/securitymagazine.css"/>
<p><!-- dataLayer scripts, place in head before GTM snippet --></p>
<p><!-- End dataLayer --></p>
<p><!-- Google Tag Manager --></p>
<p><!-- End Google Tag Manager --></p>
<p> <!--[if lt IE 9]><![endif]--></p>
<p> </head><br />
 <body data-controller="articles" data-action="show" data-article-requires-registration="true" data-article-requires-subscription="false" data-prestitial-ad="false" data-poststitial-ad="false" data-dfp-prefix="/52040140/sec" data-ad-unit-prefix="null" data-is-microsite="0" id="wp_automatic_ReadabilityBody"></p>
<p><!-- Google Tag Manager (noscript) --><br />
<noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-KNK327G" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript><br />
<!-- End Google Tag Manager (noscript) --></p>
<section class="cookie-policy" id="cookie-policy">
<div class="cookie-policy__body">
<div class="mobileHide">
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></div>
<div class="mobileShow">
<details>&#13;</p>
<summary>This Website Uses Cookies<br />By closing this message or continuing to use our site, you agree to our cookie policy. <u>Learn More</u></summary>
<p>&#13;<br />
<span style="font-family:verdana,geneva,sans-serif;"><span style="font-size:12px;"><strong><span style="color:#696969;">This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated <span style="color:#696969;">privacy and cookie policy to learn more. </span></span></strong></span></span></details>
</div>
</div>
<p><span class="cookie-policy__close" id="cookie-policy-close"/></section>
<p>   <!-- google structured data --><br />
 &#8230;</body></div>
<p><a href="https://www.securitymagazine.com/articles/94140-cyber-actors-target-k-12-distance-learning-education-to-cause-disruptions-and-steal-data">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Top 9 Cybersecurity Certifications (2020)</title>
		<link>https://risk-academy.ru/top-9-cybersecurity-certifications-2020/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 10 Dec 2020 19:38:27 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[important tool]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[Operating systems]]></category>
		<category><![CDATA[Illinois Institute of Technology]]></category>
		<category><![CDATA[real-time scenarios]]></category>
		<category><![CDATA[hacking technologies]]></category>
		<category><![CDATA[cloud computing technology]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/top-9-cybersecurity-certifications-2020/</guid>

					<description><![CDATA[Cybersecurity is becoming increasingly crucial for businesses in every sector, and it is especially vital for small- to medium-sized organizations. Cyberattacks continue to become a major problem in the United [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="mvp-content-main">
<p>Cybersecurity is becoming increasingly crucial for businesses in every sector, and it is especially vital for small- to medium-sized organizations. Cyberattacks continue to become a major problem in the United States and the rest of the globe, often times resulting in customer information being stolen.</p>
<p>Because of this increased risk, cybersecurity certifications are an important tool to prepare against the attacks. The high demand for cybersecurity skills means a top cybersecurity certification will boost one’s resumé.</p>
<p>With so many cybersecurity certifications to choose from, let’s take a look at the top ones on the market:</p>
<p>The Certified Ethical Hacker (CEH) course was developed in order to get you thinking like a hacker, which is crucial to stop one.</p>
<p>The class covers various topics and tools such as hacking technologies that are used against cloud computing technology, mobile platforms and operating systems. It also covers the latest malware and viruses, as well as information security laws and standards.</p>
<p>One of the fundamental aspects of the course is real-time scenarios, where you are exposed to various ways in which hackers breach networks and steal information. You will&#8230;</p>
</div>
<p><a href="https://www.unite.ai/top-cybersecurity-certifications/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Trike Threat Modeling as a Risk-Management Tool</title>
		<link>https://risk-academy.ru/trike-threat-modeling-as-a-risk-management-tool/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Thu, 10 Dec 2020 14:36:57 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Trike]]></category>
		<category><![CDATA[Book:Risk and Financial modelling]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Actuarial science]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[threat]]></category>
		<category><![CDATA[Cyber Threat Intelligence]]></category>
		<category><![CDATA[Threat model]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/trike-threat-modeling-as-a-risk-management-tool/</guid>

					<description><![CDATA[With everything moving online, it has become necessary for organizations to stay up to date on the latest cybersecurity threats to their organization. A cybersecurity threat is any malicious activity [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p><img decoding="async" title="risk" alt="risk" loading="lazy" class="aligncenter size-full wp-image-14299" src="https://blog.eccouncil.org/wp-content/uploads/2020/12/Trike-Threat-Modeling-as-a-Risk-Management-Tool.jpg" width="800" height="500" /><br />With everything moving online, it has become necessary for organizations to stay up to date on the latest cybersecurity threats to their organization. A cybersecurity threat is any malicious activity whose intent is to damage or disrupt digital systems. Common cyber threats include computer viruses, data breaches, and Denial of Service attacks. This is where threat modeling, an important component of the Cyber Threat Intelligence program, comes into play. Threat modeling is a risk analysis method where potential threats are identified, enumerated, and countermeasures developed. The primary purpose of threat modeling is to provide a systematic analysis of what needs to be included in the policies formed to mitigate the threat.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-15515" src="https://blog.eccouncil.org/wp-content/uploads/2020/12/Risk-Management-Tool.png" alt="Risk-Management Tool" width="650" height="623" /></p>
<p>Now that you realize the need for it, how does one go about threat modeling? Currently, there exist numerous threat modeling methodologies, each with its pros and cons. These can be combined in order to provide a more complete overlook of the entire system. One of the major keys to an effective risk management policy is the identification of risks relative to business goals and assets.</p>
<p><img decoding="async" loading="lazy" class="aligncenter size-full wp-image-15516" src="https://blog.eccouncil.org/wp-content/uploads/2020/12/Why-Trike.jpg" alt="Why Trike" width="877" height="476" /></p>
<p><strong>Why Trike?</strong></p>
<p>Trike is a unified methodology for carrying out security&#8230;</p>
</div>
<p><a href="https://blog.eccouncil.org/trike-threat-modeling-as-a-risk-management-tool/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>COVID, cyber attacks, data fraud top threats for Indian corporates: Study</title>
		<link>https://risk-academy.ru/covid-cyber-attacks-data-fraud-top-threats-for-indian-corporates-study/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 09 Dec 2020 13:31:32 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[NEW DELHI]]></category>
		<category><![CDATA[global insurance broker]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[insurance broker]]></category>
		<category><![CDATA[MARSH]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/covid-cyber-attacks-data-fraud-top-threats-for-indian-corporates-study/</guid>

					<description><![CDATA[New Delhi, Dec 9 (PTI) The public health crisis due to the COVID-19 pandemic has emerged as the top threat for Indian corporates, while cyber attacks and data frauds loom [&#8230;]]]></description>
										<content:encoded><![CDATA[<div itemprop="articleBody">New Delhi, Dec 9 (PTI) The public health crisis due to the COVID-19 pandemic has emerged as the top threat for Indian corporates, while cyber attacks and data frauds loom equally large, according to a study. </p>
<p> The report, titled &#8221;Excellence in Risk Management India 2020, Spotlight on Resilience: Risk Management During COVID-19&#8221;, has been published by global insurance broker Marsh and risk management society RIMS.
</p>
<p> While there is great optimism about the ability of organisations to rebound and address future pandemic-related challenges, cyber attacks and data fraud continue to be paramount concerns for risk professionals in India, as per the survey.
</p>
<p> Around 63 per cent of the 231 survey respondents &#8212; which included C-suite executives and senior risk professionals &#8212; identified the continued fallout of COVID-19 among the top three risks facing their organisations.
</p>
<p> Cyber attacks (56 per cent), data fraud or theft (36 per cent), failure of critical infrastructure (33 per cent), fiscal crises (31 per cent) and extreme weather events (25 per cent) were highlighted among the other top risks for Indian businesses.
</p>
<p> The majority of survey respondents (85 per cent) said the pandemic&#8230;</p>
</div>
<p><a href="https://www.outlookindia.com/newsscroll/covid-cyber-attacks-data-fraud-top-threats-for-indian-corporates-study/1990219">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Pandemic, cyber attacks and data fraud remain top risk concerns for India &#8211; Asia Insurance Review</title>
		<link>https://risk-academy.ru/pandemic-cyber-attacks-and-data-fraud-remain-top-risk-concerns-for-india-asia-insurance-review/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 09 Dec 2020 03:29:25 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Property crimes]]></category>
		<category><![CDATA[crime]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Insurance]]></category>
		<category><![CDATA[Crimes]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[Global Risks Report]]></category>
		<category><![CDATA[India Asia Insurance Review]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/pandemic-cyber-attacks-and-data-fraud-remain-top-risk-concerns-for-india-asia-insurance-review/</guid>

					<description><![CDATA[Pandemic, cyber attacks and data fraud remain top risk concerns for India&#160;&#160;Asia Insurance Review Read More&#8230;]]></description>
										<content:encoded><![CDATA[<p>Pandemic, cyber attacks and data fraud remain top risk concerns for India&nbsp;&nbsp;<font color="#6f6f6f">Asia Insurance Review</font></p>
<p><a href="https://www.asiainsurancereview.com/News/View-NewsLetter-Article/id/74966/type/ARM/Pandemic-cyber-attacks-and-data-fraud-remain-top-risk-concerns-for-India">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Malwarebytes expands security protection suite for remote workers</title>
		<link>https://risk-academy.ru/malwarebytes-expands-security-protection-suite-for-remote-workers/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 08 Dec 2020 22:28:03 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Malwarebytes Endpoint Protection]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Antivirus software]]></category>
		<category><![CDATA[Malwarebytes]]></category>
		<category><![CDATA[Coalition]]></category>
		<category><![CDATA[Microsoft Windows]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/malwarebytes-expands-security-protection-suite-for-remote-workers/</guid>

					<description><![CDATA[Malwarebytes has announced the expansion of its protection suite and industry partnerships to incorporate more features to help protect remote workers. Innovative additions including Malwarebytes Brute Force Protection and Malwarebytes’ [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Malwarebytes has announced the expansion of its protection suite and industry partnerships to incorporate more features to help protect remote workers.</p>
<p>Innovative additions including Malwarebytes Brute Force Protection and Malwarebytes’ powerful scan and detection engine helped the company to secure the CISO Choice Award for Endpoint Security for the company’s Endpoint Detection and Response product this year. </p>
<p>The company has also announced a partnership with cyber insurance provider, Coalition, to offer a combined solution of best-in-class endpoint security and cyber insurance to protect organisations from cyberthreats.</p>
<p>By detecting and blocking malicious login attempts, Malwarebytes Brute Force Protection stops intrusion attacks targeting Remote Desktop Protocol (RDP) on Windows workstations and servers. Managed through the Malwarebytes Nebula cloud platform, this new feature is integrated into Malwarebytes Endpoint Protection (EP) and Endpoint Detection and Response (EDR) products and provides easy-to-use configuration allowing security teams to get up and running in minutes.</p>
<p>“Brute force attacks are on the rise due to increases in Remote Desktop Protocol usage&#8230;</p>
</div>
<p><a href="https://securitybrief.eu/story/malwarebytes-expands-security-protection-suite-for-remote-workers">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Risk Is New Threat To Financial Stability &#8211; Analysis</title>
		<link>https://risk-academy.ru/cyber-risk-is-new-threat-to-financial-stability-analysis/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Tue, 08 Dec 2020 02:24:33 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[digital financial services]]></category>
		<category><![CDATA[bank account]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Articles]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[bank]]></category>
		<category><![CDATA[financial services]]></category>
		<category><![CDATA[threat]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/cyber-risk-is-new-threat-to-financial-stability-analysis/</guid>

					<description><![CDATA[Many of us take for granted the ability to withdraw money from our bank account, wire it to family in another country, and pay bills online.Amid the global pandemic, we’ve [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<p>Many of us take for granted the ability to withdraw money from our bank account, wire it to family in another country, and pay bills online.Amid the global pandemic, we’ve seen how much digital connection matters to our everyday life. But what if a cyberattack takes the bank down and a remittance doesn’t go through?</p>
<p>As we become increasingly reliant on digital financial services, the number of cyberattacks has tripled over the last decade, and financial services continue to be the most targeted industry. Cybersecurity has clearly become a threat to financial stability.</p>
<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img fetchpriority="high" decoding="async" title="risk" alt="risk" class="wp-image-238797" width="1024" height="781" srcset="https://www.eurasiareview.com/wp-content/uploads/2020/12/a-1024x781.png 1024w, https://www.eurasiareview.com/wp-content/uploads/2020/12/a-300x229.png 300w, https://www.eurasiareview.com/wp-content/uploads/2020/12/a-768x586.png 768w, https://www.eurasiareview.com/wp-content/uploads/2020/12/a.png 1300w" data-lazy-sizes="(max-width: 1024px) 100vw, 1024px" src="https://www.eurasiareview.com/wp-content/uploads/2020/12/a-1024x781.png"/><noscript><img decoding="async" title="safety" src="https://www.eurasiareview.com/wp-content/uploads/2020/12/a-1024x781.png" alt="safety" class="wp-image-238797" width="1024" height="781" srcset="https://www.eurasiareview.com/wp-content/uploads/2020/12/a-1024x781.png 1024w, https://www.eurasiareview.com/wp-content/uploads/2020/12/a-300x229.png 300w, https://www.eurasiareview.com/wp-content/uploads/2020/12/a-768x586.png 768w, https://www.eurasiareview.com/wp-content/uploads/2020/12/a.png 1300w" sizes="(max-width: 1024px) 100vw, 1024px"/></noscript></figure>
</div>
<p>Given strong financial and technological interconnections, a successful attack on a major financial institution, or on a core system or service used by many, could quickly spread through the entire financial system causing widespread disruption and loss of confidence. Transactions could fail as liquidity is trapped, household and companies could lose access to deposits and payments. Under extreme scenarios, investors and depositors may demand their funds or try to cancel their accounts or other services and products they regularly use.</p>
<p>Hacking tools are now cheaper, simpler and more powerful, allowing&#8230;</p>
</div>
<p><a href="https://www.eurasiareview.com/08122020-cyber-risk-is-new-threat-to-financial-stability-analysis/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Key OT Cybersecurity Challenges: Availability, Integrity and Confidentiality</title>
		<link>https://risk-academy.ru/key-ot-cybersecurity-challenges-availability-integrity-and-confidentiality/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Mon, 07 Dec 2020 11:22:06 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[waste water management]]></category>
		<category><![CDATA[Computer security]]></category>
		<category><![CDATA[Computer network security]]></category>
		<category><![CDATA[Cyberwarfare]]></category>
		<category><![CDATA[Computing]]></category>
		<category><![CDATA[United Kingdom]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Operational Technology]]></category>
		<category><![CDATA[Berliner Wasserbetriebe]]></category>
		<category><![CDATA[Berlin]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/key-ot-cybersecurity-challenges-availability-integrity-and-confidentiality/</guid>

					<description><![CDATA[Organisations are still underestimating the risks created by insufficiently secured operational technology (OT). One current example comes from Germany. According to a report by heise.de, external security testers consider it [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="">
<p>Organisations are still underestimating the risks created by insufficiently secured operational technology (OT).</p>
<p>One current example comes from Germany. According to a report by heise.de, external security testers consider it “likely” that a successful serious cyberattack against the publicly owned water company Berliner Wasserbetriebe could lead to a complete failure of the German capital’s waste water management.</p>
<p>The good news, at least for Germany, is that a combination of engineering standards and legal requirements often prevents many worst-case scenarios from happening. One such regulation requires that utility companies must be able to control their grids manually, if necessary. This is not the case in all European countries. If the legally required basic IT protections are in place, and two-factor authentication and other best practices are used, many potentially damaging incidents can be prevented or at least contained. Germany has a number of guidelines and standards that aim to minimise cybersecurity risks, including a law on basic IT security, ISO 27001, IEC62443 standards and a compendium published by the BSI, Germany’s equivalent to the UK’s National&#8230;</p>
</div>
<p><a href="https://www.tripwire.com/state-of-security/security-data-protection/key-ot-cybersecurity-challenges-availability-integrity-confidentiality/">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
