Cybersecurity

Thought provoking posts on Cybersecurity by Leadership Circle, brought to you by Spearhead Management and Dr. ir Johannes Drooghaag

BYOC - Bring your own Coffee Virtual Events Cybersecurity Cloud Sustainability Inclusions Accessibility Leadership

BYOC – Bring your own Coffee Virtual Events

BYOC – Bring your own Coffee Virtual Events is back and Leadership Circle by Spearhead Management is proud to partner with our founder Dr. ir Johannes Drooghaag for the 2022 edition of Bring your own Coffee Virtual Events! Join the conversation and contribute to the discussions on essential topics. March 2022 – How secure is …

BYOC – Bring your own Coffee Virtual Events Read More »

The largest risk in Cyber Security is a false sense of safety. The largest threat in Cyber Security are those who create a false sense of safety.

The largest threat in Cyber Security are those who create a false sense of safety.

The largest risk in Cyber Security is a false sense of safety. The largest threat in Cyber Security are those who create a false sense of safety. There are a lot of false narrative related to cybersecurity, and unless you are having the required digital skills to evaluate them all, it can be quite challenging …

The largest threat in Cyber Security are those who create a false sense of safety. Read More »

Using systems beyond End-of-Life is a significant cyber risk.

Using systems beyond End-of-Life is a significant cyber risk.

Using systems beyond End-of-Life is a significant cyber risk. Almost everyone who has been or is in a role with responsibility for IT has been in a situation where devices or operating systems had reached their end-of-life, but there were logical explanations why it would make sense to keep using them. Other priorities, budget restrictions, …

Using systems beyond End-of-Life is a significant cyber risk. Read More »

A cyber incident will happen. Plan and prepare accordingly!

A cyber incident will happen. Plan and prepare accordingly!

A cyber incident will happen. Plan and prepare accordingly! There are two phases in a cyber incident that influence the duration and impact. First there is of course the type of attack and how sophisticated it is. Although we must do everything possible to prevent a cyber incident, it is hardly possible to guarantee that …

A cyber incident will happen. Plan and prepare accordingly! Read More »

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation!

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation!

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation! Our study The Human Element in Cybersecurity shows that abandoned technology is by far the largest root cause of cybersecurity incidents. And a significant part of abandoned technology is unpatched vulnerabilities. Vulnerabilities in applications, firmware, operating systems, drivers, …

Not patching critical vulnerabilities is an open invitation to exploit them. Cyber criminals will accept that invitation! Read More »

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. It is time we develop that soft-skill!

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill.

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. It is time we develop that soft-skill! For many years the focus of cybersecurity initiatives has mainly been on technology, which is of course important but does not cover the entire bandwidth of challenges and …

After being celebrated as a technical skill for many years, Cyber Security is finally getting recognized as a crucial soft-skill. Read More »

Prevention costs significantly less than cyber incidents.

Prevention costs significantly less than cyber incidents.

Prevention costs significantly less than cyber incidents. IBM recently published their annual Cost of a Data Breach Report, which gives valuable insights in the developments of cyber incidents and the various costs of data breaches. One thing is very clear when we review this report – the technical impact of a cyber incident is just …

Prevention costs significantly less than cyber incidents. Read More »

Data Loss Prevention is not only the last resort during a cyber incident, in most ransomware cases it is the only resort.

Data Loss Prevention is not only the last resort during a cyber incident, in most ransomware cases it is the only resort.

Data Loss Prevention is not only the last resort during a cyber incident, in most ransomware cases it is the only resort. Data Loss Prevention is, as most of us hopefully know, much more than just making backups from important data, but is all starts with backups, of course. These backups should however also include …

Data Loss Prevention is not only the last resort during a cyber incident, in most ransomware cases it is the only resort. Read More »

Patching, segmentation, and identity/access control are by far the most effective and simplest of all cyber security measures.

Patching, segmentation, and identity/access control are by far the most effective and simplest of all cyber security measures.

Three basic elements of cybersecurity, which are also known as the foundation or cornerstones of cybersecurity, are by far the most effective and simple measures to protect organizations and infrastructure against cyber threats. Without these basic elements, the implementation of more advanced concepts like ZERO trust are not possible, and in fact, don’t make any …

Patching, segmentation, and identity/access control are by far the most effective and simplest of all cyber security measures. Read More »