Navigating the Double-Edged Sword of AI
How generative AI is already being used for fraud, impersonation, and cybercrime—and what your organization can do about it.
How generative AI is already being used for fraud, impersonation, and cybercrime—and what your organization can do about it.
As the digital perimeter continues to dissolve, security leaders are rethinking how they manage cyber risk. Penetration testing and vulnerability management remain essential—but they’re no longer enough on their own. Today’s attackers exploit what lies beyond your defined scope: misconfigured cloud buckets, forgotten subdomains, exposed APIs, and rogue SaaS apps. To stay ahead, organizations need not just testing, but visibility. That’s where continuous Attack Surface Management (ASM) comes in.
As organizations strengthen their internal security, attackers are shifting their focus — exploiting what’s outside your firewall. The external threat landscape has evolved far beyond just domains and IP addresses. Today, it includes employee data on data broker sites, leaked credentials on the dark web, chatter on adversarial forums, and impersonations through ads and decentralized platforms. In this article, we highlight what you need to know about these risks and how to improve your visibility.
A Project Management Office (PMO) can strengthen cybersecurity initiatives by applying structured processes, resource coordination, and risk management best practices to compliance requirements. Below are key examples of how Access Point’s PMO provides concrete, day-to-day benefits in typical security projects such as PCI DSS, HIPAA, SOC certifications, and other security enhancements.
With a countless number of reported ransomware attacks every month, it seems like the cybersecurity industry is losing its battle with cyber-criminals...
Healthcare weathered a massive increase in data breaches during 2023, with more records disclosed than in both 2021 and 2022 combined. HIPAA Journal reported that over 11 million medical records were disclosed in 2023, with most being data breaches from supply-chain vendor vulnerabilities and ransomware.
Your company may have best-of-breed security solutions by today’s standard, but it may not necessarily be enough to stop the thousands of new and emerging threats introduced every day. To maintain a strong security posture in today’s threat landscape, you need a way to proactively detect new threats so that you can create strategies to stop them.
According to the US Department of Health and Human Services, cyber criminals unleash 4,000 ransomware attacks daily. Many of these threats target healthcare organizations where they have few staff to mitigate, contain, eradicate and investigate attacks. Ransomware is the most common method by which these devastating cyber attacks are carried out, leaving healthcare organizations with few options, often leading to negative impacts on productivity and revenue.
If you have ever shopped for cybersecurity insurance, you know that insurance costs depend on a number of factors including the size of your business, number of employees, your industry, and the type of data stored. Another perhaps more significant factor is your current cybersecurity posture, an increasingly objective measure of your susceptibility to malware, phishing, social engineering, or service interruption.
In October 2022, Medibank administrators became aware of suspicious activity on the corporate network environment. Investigations took place, and the initial investigation found that the suspicious traffic was from an external threat including ransomware.
Recently, it seems like hospitals and healthcare providers suffer from a data breach every month, many of them due to third-party vendor vulnerabilities. The healthcare industry suffered from another data breach on March 14 when a third-party vendor responsible for managed care administration announced that a hacker stole more than 4.2 million patient records, the biggest breach of 2023 at that time.
A recent US Cybersecurity and Infrastructure Security Agency (CISA) survey showed that eight out of ten organizations reported at least one person within their business fell victim to a phishing attack. CISA performed its own penetration test on organizations willing to be tested, and the results confirmed that most businesses are vulnerable to cyber-criminals using social engineering and phishing methods.
Ever since the SolarWinds hack in 2020, more businesses are aware of the risks third parties bring into their own enterprise environment.