Thwarting Cybercrime With Will Loomis and Stewart Scott

More than a quarter of the total incidents identified by the researchers involved criminals that compromise apps and app-development tools for venues like Apple Store, Google Play Store and others, sometimes creating a “look-alike” app. He notes that some of the biggest cyberattacks in recent history—such as the May 2021 shutdown of the Colonial Pipeline […]

More than a quarter of the total incidents identified by the researchers involved criminals that compromise apps and app-development tools for venues like Apple Store, Google Play Store and others, sometimes creating a “look-alike” app. He notes that some of the biggest cyberattacks in recent history—such as the May 2021 shutdown of the Colonial Pipeline by ransomware criminals—could have largely been prevented by setting and following simple security policies, like two-factor authentication and differentiated passwords. “We’ve heard of a lot of good sentiment from key stakeholders who tell us they’re aware this is an issue and they’re starting to think about their organizational cybersecurity in a better and more focused technology mindset,” Will says.
Source: CloudBees