We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Content Aggregator

\ Content Aggregator\ Threats & Incidents

 

Vetted, curated, third party sourced information security content in downloadable PowerPoint format to support internal communications to the C-suite, Board, and lines of business.

IANS Content Aggregator

[ 386 ]

Slides

Single Content Aggregator slides, organized by six topical categories.

View All Slides
[ 5 ]

Compilations

Collections of single Content Aggregator slides on specific InfoSec topics.

View Compilations
[ 2 ]

Narratives

Compilations of slides that include a viewpoint or “IANS Perspective”.

View Narratives


December 7, 2018 | Threats & Incidents

 20% of Ransomware Victims Lost Data Even After Paying

Of the organizations that were victims of a ransomware attack, 39 percent paid ransom in Bitcoin or other currency, but only 20 percent paid and actually recovered their data. Another 53 percent didn’t pay and still recovered their data.

Read More »


December 3, 2018 | Threats & Incidents

 Overview of APT 1: China’s Cyber Espionage Group

Chinese hacking group APT 1 conducts cyber espionage campaigns against organizations around the world. These organizations run the gamut from construction and manufacturing companies to aerospace and energy firms.

Read More »


November 30, 2018 | Threats & Incidents

 Top Indicators of a Strong Security Posture

IT and business professionals say the biggest indicators of a strong security posture include strong risk management policies (58%) and the knowledge that they have already successfully thwarted real attacks (45%).

Read More »


November 26, 2018 | Threats & Incidents

 Phishing: Overview of Most Susceptible Industries

Insurance and manufacturing employees at mid-sized companies were most likely to click on a suspicious link or email or obey a fraudulent request, according to a study of 241,000 phishing tests. For larger companies, employees at non-profits and insurance firms were most susceptible to phishing attacks.

Read More »


November 19, 2018 | Threats & Incidents

 Industrial Control Systems: Top 5 Security Standards Used

Almost half (48%) of IT and industrial control systems security practitioners map their cybersecurity standards to the NIST Cyber Security Framework (CSF). Less than a quarter (22%) adhere to the North American Electric Reliability Corporation critical infrastructure protection plan (NERC CIP), a set of requirements designed to secure the assets operating North America's bulk electric system.

Read More »


November 16, 2018 | Threats & Incidents

 Overview of How Organizations Secure Applications

Almost two-thirds of IT and security professionals (61%) say they secure their applications by educating developers on safe coding, 59 percent use penetration testing, 53 percent use data masking during testing, and half (50%) use data and key encryption.

Read More »


November 12, 2018 | Threats & Incidents

 Cyber Attacks Among Top Risks to GDP in North America

North America, including the U.S. and Canada, could potentially lose some $14.7 billion in Gross Domestic Product (GDP) per year due to cyber attacks. That trails only the risk of a market crash, with a potential GDP loss of $19.9 billion.

Read More »