ReportWire

Tag: Data & Recovery

  • Get This CompTIA Super Bundle For Just $59.99 | Entrepreneur

    Get This CompTIA Super Bundle For Just $59.99 | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    It’s pretty clear what’s happening. We are creating more devices and placing more value on digital assets as time goes on. Therefore, it makes sense that the field of cybersecurity is growing rapidly. In fact, there are over three-quarters of a million cybersecurity job openings across the United States. For aspiring professionals who are interested in learning about cybersecurity, This knowledge-packed IT course bundle is on sale for $59.99 (reg. $195) for a limited time.

    This bundle features 13 courses and nearly 240 hours of content on CompTIA and cybersecurity. CompTIA It Fundamentals+ is one of many well-reviewed courses in this bundle. It breaks down how CompTIA Fundamentals certification is a must for those who don’t have an IT background and want to break into the field. Across its 58 lectures, this course includes breakdowns of computer hardware, software, IT terminology, basic computing, databases, and more.

    CompTIA Cloud Essentials+ is another well-reviewed course in this bundle. It breaks down how to improve your cloud-based IT skills, how to be better prepared to find the right cloud solutions for different business environments, and how to better understand cloud-based infrastructure services.

    These courses are taught by instructors from Iducate, which is an IT training services provider with over 700,000 students across the world. And this bundle is rated an average of 4.8/5 stars by verified purchasers. One five-star reviewer wrote, “Very worth the buy.”

    Get the Complete 2023 CompTIA Course Super Bundle by Iducate on sale for $59.99 (reg. $195).

    Prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • Save More Than $1,000 on Lifetime Access to 20TB of Secure Cloud Storage | Entrepreneur

    Save More Than $1,000 on Lifetime Access to 20TB of Secure Cloud Storage | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    In today’s digital world, there’s a strong possibility that you rely on modern digital storage solutions to help you run and manage your business. Instead of running out of room or paying more and more for your expanding storage needs, consider investing a one-time fee for years of reliable coverage.

    Normally sold for nearly $1,500, a lifetime subscription to 20TB of Prism Drive secure cloud storage is currently on sale at only $99.99 (reg. $1,494) with no coupon required. That’s more than 90-percent savings on an instant upgrade for steadily increasing cloud-based storage needs.

    An exclusive best-on-the-web price makes it much easier to save and access a full range of file formats from a variety of devices. Utilize Prism on web browsers or iOS and Android smartphone setups.

    This subscription simplifies the process of juggling files such as JPEG, MP4, PPT, and XLS, allowing for seamless distribution and editing. Now you’re never too far away from the office or house to get access to the documents or files that need your attention now, and 20TB of space provides plenty of flexibility.

    There is also a safeguard in place for subscribers that creates even more protection against losing the digital items you can’t afford to misplace. Prism allows users to recover recently deleted files and restore them as necessary within a 30-day window, preventing momentary human error from making a long-term impact.

    Enjoy the full range of comprehensive cloud-based capabilities for years to come by picking up a lifetime subscription to 20TB of Prism Drive secure cloud storage at only $99.99 (reg. $1,494).

    Prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • Get a Lifetime of Password Protection for $20 During the Labor Day Sale | Entrepreneur

    Get a Lifetime of Password Protection for $20 During the Labor Day Sale | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    Cyber attacks may seem like an abstract threat, but there are very real things you can do to help prevent threats to your business. A recent TraceSecurity report found that 81% of company data breaches were just caused by poor passwords.

    Improving your password security involves a bit more than adding a few digits to your company login. If you want more comprehensive password security assistance, the trick is to get a good password manager like Sticky Password. This Premium Password Manager can generate, save, and autofill an unlimited number of encrypted passwords, and it has been marked down to $19.97 during the Labor Day Sale.

    Get a password manager for life for Labor Day.

    Sticky Password is a simple service that generates, saves, and fills in your passwords for you. Once you log in, you can enter your passwords for each account you want to connect. Once a password is saved, Sticky Password will sync with the devices on your account. You can even save your password data locally so there’s no vulnerable information online.

    A Sticky Password Premium Plan comes with some extra bonuses suited to the more advanced security needs of a business versus an individual. The Premium Plan includes unlimited encrypted passwords and data storage, automatic form-filling, password generation, a secure digital wallet, support for two-factor and biometric authentication, and connection on all your mobile and desktop devices. Plus, you get a secure cloud backup with all your password data and priority support.

    It’s no wonder Sticky Password received a rave review from PCMag, which wrote, “Sticky Password Premium does everything you’d expect from a password manager and more. New biometric authentication and no‑cloud Wi‑Fi sync make it an even better choice.”

    Purchase privacy this Labor Day.

    Worried about your business’s online security? Start by protecting your passwords.

    During our Labor Day Sale through September 4 at 11:59 p.m. PT, get a lifetime subscription to Sticky Password Premium for just $19.97 — no coupon required.

    Prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • Get This Top-Rated VPN for the Best Price Online, Just $69.97 for a Three-Year Subscription | Entrepreneur

    Get This Top-Rated VPN for the Best Price Online, Just $69.97 for a Three-Year Subscription | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    Whether you’re working toward building your business or simply browsing the web for the best entrepreneur tips, we’re all spending a lot of time on the internet. You can make sure you’re spending those hours wisely (and safely!) with the help of a good VPN.

    Windscribe VPN offers an excellent privacy solution that lets you surf the web safely and securely, offering more than a basic VPN. And, you can currently score a three year subscription to this handy service for the lowest price online, only $69.97 until August 22 at 11:59 p.m. Pacific.

    If you’ve been in the market for a straightforward VPN, look no further than Windscribe VPN. It comes with an easy-to-use interface. It also offers a desktop application and browser extension that work together to ensure you stay safe online on your devices while enjoying added benefits like unblocking websites as you surf the web and getting rid of ads and trackers from your browsing. Your business can seriously benefit from Windscribe VPN’s advanced security, and you can rest easy knowing your devices and internet connection are protected.

    You can even take advantage of Windscribe’s unlimited downloads and simultaneous connections while ensuring you stay anonymous, thanks to their above-average anonymity. There are no identifying logs, and strong encryption keeps your information on lock. You don’t even need an email address to sign up! You’ll quickly see why Tech Radar, PC World, and G2 gave Windscribe VPN an impressive 4- out of 5-star rating.

    Keep your business and online activity secured with the help of a trustworthy and reliable VPN.

    Stay safe while you surf the web with a three year subscription to the Windscribe VPN Pro Plan, now on sale for just $69.97, the best price online. Hurry, this offer only lasts until August 22 at 11:59pm Pacific!

    Prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • A Cybersecurity Expert Reveals Why You’re a Cybercriminal’s Next Target — and 5 Things You Can Do to Beef Up Your Defense. | Entrepreneur

    A Cybersecurity Expert Reveals Why You’re a Cybercriminal’s Next Target — and 5 Things You Can Do to Beef Up Your Defense. | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    If your company was hit by ransomware today, who would you call? Or perhaps a better question: How would you call them? It sounds absurd, but as a cybersecurity expert, I’ve seen organizations paralyzed in the first hours after an incident simply because nobody knows anyone’s cell number anymore. Without access to email or messaging systems, communication grinds to a halt and workers, customers and suppliers are all left wondering what is going on. Panic rapidly escalates into a crisis.

    There’s a tendency to think about cybersecurity as being the responsibility of the IT or security department. But protecting your company comes down to two things: organizational culture and planning. That’s why some of the most important people on cyber defense aren’t in the IT team — they’re in human resources.

    The HR team is uniquely placed to embed cybersecurity preparedness into the everyday working of an organization. It’s responsible for building the policies and processes to mitigate risks and ensure the business has the competencies to be resilient to foreseeable challenges — and those include cyberattacks. And as the custodians of employees’ sensitive personal information, HR teams are themselves prime targets for hackers.

    Unfortunately, this vital role is often overlooked. So here are five ways HR can help make your business a tough target for cybercriminals.

    Related: 78% of Employers Are Using Remote Work Tools to Spy on You. Here’s a More Effective (and Ethical) Approach to Tracking Employee Productivity.

    Build a cybersecurity culture

    Eternal vigilance is the price of our liberty to roam the internet. The number of threats is mind-blowing — a recent report found the average education institution faces more than 2,300 attempts to breach its systems in a week, while healthcare organizations fend off more than 1,600 attacks. With so many digital grenades being lobbed, it’s incredibly hard to catch them all. However, a strong cybersecurity culture helps an organization defend against attacks and limits the blast radius when one does get through. The tough part: Everyone has to be on the same page when it comes to online behaviors.

    Step one is to ensure you have the training tools so that employees know what they should and should not be doing. Most organizations are reasonably good at this. Whereas, many fall short by not putting that information into practice every day.

    The best way to ensure that everyone considers cybersecurity a fundamental part of their responsibilities is to build it into performance reviews. This should not take the form of calling out workers for every dodgy link they click on. Instead, it should be a constructive conversation about how they’re keeping up with their cyber literacy training. There are cyber health-check tools that workers can use to analyze their online behavior and address weaknesses (like reusing Pa$$w0rd across half the internet or not using two-factor authentication) and often these can be used to track progress toward cybersecurity goals at an organizational level.

    When safety precautions are regularly discussed, they just become part of how you do business.

    Protect your crown jewels

    HR has custody of some of the most sensitive information in an organization — and hackers know this. In the past five years or so, many companies have adopted platforms that enable employees to self-serve routine tasks like vacation requests. However, third-party platforms come with risks. Hackers target them in so-called supply chain attacks, knowing that if they get lucky, they can access troves of information from multiple companies. In 2021, more than 300 organizations were breached in a hack of a widely used file transfer system. One of these was the University of California, which said the information exposed included employees’ social security numbers, driver’s licenses and passport details (the UC system offered its staff free ID monitoring services).

    Job one for HR professionals is to ensure employee data remains confidential. Perform extensive due diligence before your organization signs up for any third-party HR service. Only consider companies that comply with international standards (SOC 2 and ISO 27001 are the main ones to look out for) and check online for reports of security incidents at the site in the past few years. Also, look into where your data is being stored and how it is being backed up. Depending on your location and industry, you may have to comply with data residency laws.

    Stop hoarding data

    Updating the data retention policy should be on the to-do list of every HR department. I say updating because every company has a data retention policy whether they know it or not. If yours isn’t written down, then your policy is simply to keep everything forever. And that exposes you to considerable risk. The more data you have, the worse a breach can be — it’s especially bad if you’re hoarding data you no longer need. Many jurisdictions have limits on how long companies should retain sensitive information — it’s often around seven years for records on former employees.

    Figure out who will call the shots when a breach happens

    Cybersecurity may be everyone’s day-to-day responsibility, but when an attack gets through there should be one person in charge of the response. In cybersecurity lingo, we call this the incident commander. While everyone can have an opinion on the best course of action, decision-making power rests with them.

    The job spec for incident commander only has one line: It’s whoever best understands cybersecurity issues in your organization. Depending on the size of your business, that might be a cybersecurity leader, the head of IT or it could be Joanne in accounting who took a few courses on this stuff. Whoever it is, make sure you’ve identified them before an incident happens and have clearly communicated that to your team. Once a cybersecurity incident happens, events move quickly — in one case I was involved in, the hackers gave a 45-minute warning before starting to post sensitive information — so you don’t want to waste time figuring out who’s in charge.

    Run some drills

    Planning is only one half of the equation. Practice is the other. Plenty of research has shown that people don’t think clearly in stressful situations. We perform drills for fires and earthquakes to give us a framework to fall back on in an emergency. The same idea works for cybersecurity incidents. Set aside two hours once a year to run a tabletop exercise with key staff that simulates what you’ll do if the company is hacked. In these exercises, someone takes the role of a moderator to explain the nature of the attack and what’s been affected, while everyone else plays out how they’d respond.

    The first time you conduct the exercise, it’ll likely be a mess — but that’s the point. The scramble to figure things out will reveal the gaps in your plans. Over time, the drills will become second nature.

    Related: So, You’ve Been Hacked. These are the Best Practices for Business Leaders Post-Hack

    And write contact information down — on paper

    Put the incident team’s phone numbers down on paper and update the list regularly. Yes, it’s old school. Yes, it’s annoying. And yes, one day you’ll be thankful you did.

    [ad_2]

    Claudette McGowan

    Source link

  • Degoo Premium Offers an Ample 10TB of Lifetime Cloud Storage for Less Than $100 | Entrepreneur

    Degoo Premium Offers an Ample 10TB of Lifetime Cloud Storage for Less Than $100 | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    We’re all just one coffee spill or computer crash away from losing a wealth of important files…if we don’t have a storage solution in place. And if you’ve diligently subscribed to a cloud storage option, like millions of Americans who are paying around $225 billion a year annually on cloud infrastructure services according to Statista, then we don’t need to remind you how costly that gets.

    If you’re looking for a solution that offers secure storage for your important data, ample space to grow with, and a one-time low price that’s easy on the wallet, look no further than this Degoo Premium: Lifetime 10TB Backup Plan. It’s currently on sale for just $99.99 — cutting nearly $1,000 off the $1,080 price tag — with no coupon code needed.

    With Degoo Premium, you can backup your file securely for one low price, with a generous 10TB of storage space. That’s ample enough to hold personal and business files alike, while you sleep easy knowing everything is safe thanks to Degoo Premium’s 256-bit AES encryption. Need to share something? Sending links is super simple with Degoo, too, just send it over via email, link, or messaging app.

    When you upload files onto the Degoo Premium cloud, they’re automatically duplicated to give you peace of mind. Upload from any device at any time, and rest assured their automatic file change detection will keep your information up to date. There are even AI-powered photo discovery features included that help you find the best files and save you time.

    Safeguard your files and memories with this Degoo Premium Lifetime 10TB Backup Plan for just $99.99 (reg. $1,080), no coupon code required.

    Prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • Protect Your Business with Norton Cybersecurity for Just $25 | Entrepreneur

    Protect Your Business with Norton Cybersecurity for Just $25 | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    Every entrepreneur has a vested interest in cybersecurity given how frequently small businesses become the target of cyber attacks. But while many entrepreneurs can’t afford a complete IT and security team, they can afford a Norton 360 Standard plan with LifeLock now that it’s discounted by 77%. This easy-to-use, easy-to-install protection bundle provides advanced protection against viruses, online threats, dark web monitoring, and Identity Theft Restoration Support for two devices.

    Norton 360 Standard offers a prepaid subscription so you’ll pay just once a year for protection against ransomware, viruses, spyware, malware, and other online threats. The real-time threat protection helps defend against existing and emerging threats while the secure, no-log VPN offers bank-grade encryption to keep information like passwords and bank details more private. Norton 360 Standard also offers a password manager for seamless login, and PC SafeCam to notify you if anybody attempts to use your webcam.

    Should your information be put at risk or identity stolen, LifeLock Identity Advisor offers U.S.-based Identity Restoration Specialists to help you come to a resolution, along with Dark Web Monitoring to search for evidence of your personal information being shared in places it shouldn’t be.

    The easy-to-use interface lets you enter additional information to be monitored, get advice, and view notifications with ease. Whenever anything happens that could put your digital security at risk, Norton will make sure you know the second it happens so you can work towards mitigation.

    Protect yourself and your business online. Right now, you can get a one-year subscription to Norton 360 Standard for two devices with LifeLock Identity Advisor for 77% off 109 at just $24.99.

    Prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • How ChatGPT Can Help Marketers in Creating Effective Digital PR Strategies | Entrepreneur

    How ChatGPT Can Help Marketers in Creating Effective Digital PR Strategies | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    ChatGPT is a game-changer for marketers, particularly those working in digital PR. This innovative language model, created by OpenAI, has completely transformed the way I approach my work. As someone with years of experience in the industry, I can confidently say that ChatGPT is one of the most exciting developments I’ve seen. In this article, I’ll share my personal experience with the tool and explain how it has revolutionized my PR strategies.

    1. Identifying target media outlets

    We’ve all heard the phrase “know your audience.” However, in the domain of digital PR, it’s even more imperative to know where to interact with them. This is where the first boon of ChatGPT comes into play. It has a unique capability to identify the most apt media outlets for my campaigns. Let me explain how it does this:

    ChatGPT with certain plugins uses a multitude of data points such as:

    • Audience demographics
    • Industry focus
    • Geographic reach

    These factors inform its suggestions on the best publications, websites, influencers, and even bloggers to target. I’ve identified this approach to be remarkably efficient in making sure my messages are received by the intended audience at the ideal time.

    So, what’s the result? Higher engagement.

    How much? A cool 30% boost on average, based on my own findings. All thanks to ChatGPT. It’s a game-changer, really. Suddenly, it’s not just about spraying and praying. It’s about precision. It’s about putting your message on a silver platter, serving it right where your audience dines.

    Remember the days of manual audience targeting? I do. It was guesswork, mostly. With ChatGPT, it’s not a shot in the dark. It’s science. It’s data-driven.

    Now, here’s the part I find most delightful. It’s not merely about identifying the correct platforms. ChatGPT helps craft the message too. It’s like a seasoned copywriter, knowing what resonates with your audience. That’s gold for any marketer.

    Related: Here’s How CEOs and Millionaires Use ChatGPT for a Productivity Boost

    2. Competitive analysis and social media strategy

    In the world of marketing, it’s important to keep a close eye on your competitors. ChatGPT is a tool that can help with this by providing a detailed analysis of their PR strategies. By examining their press releases, media coverage, and social media presence, ChatGPT can extract valuable insights into their tactics, messaging and positioning. This information can be used to devise winning strategies and stay ahead of the competition.

    ChatGPT is a valuable tool for enhancing your social media strategy and complementing your PR campaigns. With ChatGPT, you can determine the most effective content for your audience and identify the platforms where they are most active. It also provides a playbook of engagement tactics that can help you win the social media game. By leveraging ChatGPT’s insights, you can supercharge your social media presence and see a healthy spike in engagement.

    3. Crisis communication guidance

    No matter how carefully we plan, crises happen. In such situations, swift and effective communication is key. ChatGPT provides much-needed assistance in navigating these tricky waters. When a crisis or negative PR event arises, it helps me craft suitable responses and strategies.

    ChatGPT helps shape the narrative in a way that is both honest and constructive. It aids in developing statements that address the issue head-on while conveying an organization’s commitment to resolving the problem.

    ChatGPT can analyze vast amounts of data, including customer feedback, to identify the most pressing concerns that need to be addressed. This ensures that the organization’s communication is relevant and resonates with its audience. Trust is critical for any organization, and it is often the most impacted during a crisis. ChatGPT helps restore this trust by crafting messages that communicate transparency, accountability, and a plan for moving forward.

    Related: 5 Ways ChatGPT Will Impact Digital Marketing

    4. Monitoring and analyzing PR campaigns

    Similar to any marketing endeavor, PR drives need to be tracked and assessed to determine their impact. Here, again, ChatGPT steps up to the plate.

    It provides insights into key performance indicators (KPIs), suggests tracking tools, and outlines methods to evaluate the impact of PR efforts. With its help, I’ve been able to hone my strategies based on data-driven insights, leading to a 20% improvement in overall campaign effectiveness.

    ChatGPT can provide insights into the sentiment, trends and public opinion surrounding a PR campaign by gathering and processing this data in real-time. It can identify positive or negative sentiments, detect emerging issues or crises and monitor campaign messaging’s reach and engagement. This data enables PR teams to evaluate the efficacy of their efforts and optimize future strategies based on empirical evidence.

    Yet, as magical as ChatGPT may seem, we must remember it’s still a tool, albeit a powerful one. It is essential that we, as marketers, review and validate the suggestions provided by ChatGPT and adapt them to our specific needs and industry context.

    ChatGPT can be a powerful tool in the world of digital PR, but it’s important to use it wisely. As the saying goes, the effectiveness of a tool depends on the skill of the person using it. With the right approach, ChatGPT can be a valuable asset for businesses looking to improve their online presence and engage with their audience.

    [ad_2]

    Pritom Das

    Source link

  • Don’t Overlook This Critical Element in Your Cybersecurity Strategy | Entrepreneur

    Don’t Overlook This Critical Element in Your Cybersecurity Strategy | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    The SaaS model has revolutionized the way businesses operate and engage with software. By allowing businesses to access software applications over the internet on a pay-as-you-go basis, it eliminates the need for complex physical infrastructure and extensive maintenance. Additionally, it offers startups the agility to scale swiftly and leverage a recurring revenue model.

    However, this increasing reliance on cloud-based services implies an expanded attack surface, the points where potential cybersecurity threats can penetrate the system. In the SaaS realm, providers are custodians of their customer’s data. Therefore, data breaches could significantly tarnish their reputation, lead to financial losses and even invite legal liabilities.

    Related: This Is Why We Need To Focus More on Cybersecurity Strategy

    Attack surface management: Unveiling the concept

    In cybersecurity parlance, the attack surface refers to all the potential points where unauthorized users might infiltrate the systems or data. These points could be hardware, software, networks or even users. As SaaS startups grow, so does their attack surface, making it a complex task to secure their landscape.

    ASM involves the continuous practice of mapping, monitoring and managing this surface to neutralize potential security threats. This encompasses identifying vulnerabilities, reducing unnecessary access privileges and conducting perpetual surveillance for new potential risks.

    Why SaaS startups must implement an ASM strategy

    For SaaS startups, implementing a robust ASM strategy is critical. Here are the reasons, along with some technical considerations:

    Reducing vulnerabilities:

    By accurately identifying their attack surface, startups can discover system vulnerabilities before cyber criminals exploit them. These vulnerabilities can be:

    • Software vulnerabilities: Bugs or errors in the code, outdated software and unpatched systems can serve as a gateway for attackers.

    • Network vulnerabilities: Weak or poorly configured network security measures can provide opportunities for attacks.

    • Human vulnerabilities: Employees can unwittingly create security holes by falling for phishing scams, using weak passwords or failing to follow best practices.

    ASM helps startups proactively address these vulnerabilities, using tools such as vulnerability scanners and automated patch management systems.

    Regulatory compliance:

    As data privacy and security draw global attention, industries are burdened with rigorous regulatory obligations. Non-compliance can lead to severe penalties and legal ramifications. ASM helps startups meet regulations such as GDPR, CCPA and HIPAA by ensuring they have a clear understanding of their data flows, access controls and security vulnerabilities.

    Protecting brand reputation:

    In the era of digital commerce, customers’ trust in a brand is often tied to their confidence in its ability to secure their data. A single data breach can severely damage a startup’s reputation, making it difficult to retain customers and attract new ones. ASM plays a crucial role in building and maintaining this trust by demonstrating a proactive approach to security.

    Avoiding financial loss:

    Cybersecurity breaches often result in significant financial losses, from system downtime and loss of business to legal fees and regulatory penalties. Startups, particularly in the early stages, might not have the financial resilience to withstand such losses. Implementing an effective ASM strategy can help prevent these damaging events.

    Fostering customer confidence:

    A strong security posture isn’t just about avoiding negative outcomes; it can also serve as a key differentiator in a competitive market. When startups can clearly communicate their commitment to data protection and demonstrate robust ASM practices, they build trust and confidence among their customer base, leading to improved retention and acquisition.

    Related: Why Is Cybersecurity Important for Your Business? Neglecting It Could Be Your Downfall.

    The how-to of implementing effective ASM

    Given its criticality, how can SaaS startups implement effective ASM? Here are a few strategies, each with its technical facets:

    Comprehensive visibility:

    Comprehensive visibility is fundamental to effective ASM. SaaS startups need to maintain a clear and detailed understanding of their digital ecosystem. This entails the identification and documentation of every piece of hardware, every software application, all network components and data.

    Asset discovery:

    The first step is to perform asset discovery, which can be a daunting task given the vast and interconnected digital assets in a SaaS setup. An asset discovery tool is typically used to automate this process. These tools scan IP addresses across the network, identifying and cataloging every device and system in their path.

    Asset discovery tools not only detect assets but also gather metadata about them, including the operating system, installed software, open ports and more. This data is invaluable when it comes to managing and reducing the attack surface.

    Cloud assets and shadow IT:

    For SaaS startups, it’s important to extend visibility to cloud assets. Traditional asset discovery tools may not cover cloud-based assets like virtual machines, databases or containers. Using cloud-native tools or third-party solutions that can discover and monitor cloud assets is essential.

    Startups should also watch out for shadow IT, which refers to software, devices or services used without explicit IT department approval. These can significantly expand the attack surface, often without the knowledge of IT or security teams. Solutions for shadow IT discovery and control are available and should be a part of the visibility strategy.

    Regular assessments:

    Regular vulnerability assessments can preempt potential threats before they materialize. Startups can use automated vulnerability scanning tools, which will systematically check their systems for known vulnerabilities and penetration testing, a more aggressive approach that simulates the tactics of real-world attackers. With the digital landscape in constant flux, regular assessments form a critical part of ASM. These assessments should focus on identifying vulnerabilities that could potentially be exploited by attackers.

    Vulnerability scanning:

    Vulnerability scanning is an automated process that checks systems for known vulnerabilities. These tools utilize databases like Common Vulnerabilities and Exposures (CVE) to identify software weaknesses. For comprehensive protection, startups should ensure their vulnerability scanning tools cover their entire environment — including cloud and mobile assets.

    Automation:

    With the complexity of modern digital environments, automation is vital for effective ASM. Automated scanning should be supplemented with manual code reviews, especially for the startup’s proprietary software. Manual reviews can often catch logical errors or other issues that automated tools might miss.

    Penetration testing:

    Penetration testing takes vulnerability assessment a step further. Rather than just identifying potential vulnerabilities, it actively attempts to exploit them to evaluate the system’s defense capability. This form of testing mimics real-world attacks and can help startups understand how an attacker could potentially breach their defenses. While regular penetration tests are essential, they should be performed by certified ethical hackers or reputable third-party security firms to ensure the process doesn’t inadvertently cause harm.

    In a nutshell, with escalating cyber threats, attack surface management has become a critical element of the cybersecurity strategy for SaaS startups. By proactively identifying, managing and minimizing their attack surface, startups can safeguard their customers, reputation and bottom line while fostering a resilient cybersecurity culture. This proactive approach will stand them in good stead as they navigate the dynamic and often challenging landscape of the SaaS industry.

    Related: Cybersecurity for Small and Medium-Sized Businesses — How to Conduct a Comprehensive Risk Assessment

    [ad_2]

    Jim Koohyar Biniyaz

    Source link

  • Why Businesses Should Go Passwordless as Soon as Possible | Entrepreneur

    Why Businesses Should Go Passwordless as Soon as Possible | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    In the privacy-driven business environment, passwords are gradually becoming obsolete. Did you know that the first digital password debuted in the 1960s? Until then, passwords had remained the same over time, despite several improvements to digital identification and verification.

    Certainly, passwords are a holdover from the era before when cyber crime and password-based attacks became a serious and pervasive issue. With the proliferation of technology and user accounts, major challenges have emerged due to passwords, including the need for users to remember numerous passwords, support expenses and — most importantly — the security concerns posed by stolen credentials. As a result, the reason for eliminating passwords from the authentication process becomes more compelling every day. This is where passwordless authentication comes to the rescue.

    Related: Here’s Why It’s Time to Move Away From Passwords

    What is passwordless authentication?

    Passwordless authentication eliminates the need for a password by allowing users’ identities to be verified by their biometrics or other possessions, thereby minimizing security vulnerabilities. Backing this statement, Microsoft claims that combining biometrics and possession authentication reduces account security risks by 99.9%.

    Considering the vulnerabilities of password-based authentications, businesses must take the necessary actions to implement passwordless authentication as soon as possible to secure their users’ data and identities. In light of that, I’ll explain why this is the ideal time for businesses to use passwordless authentication.

    Witnessing current technological advancements, it is evident that authentication techniques have also advanced significantly since former times, providing us with safer and more beneficial alternatives for authentication. Why do we still secure our data using old and ineffective techniques like password-based authentication?

    However, fortunately, businesses are now quickly evolving to replace passwords since technology and its users continue to grow along with the demand for branding, visibility and application efficiency, thereby leading to enhanced data privacy and security.

    Considering the potential dangers and inconveniences involved with using passwords, many businesses are now moving on from passwords eventually and switching to more secure authentication methods like passwordless authentication. Furthermore, given the surge in cyber attacks and credential theft, abandoning passwords is highly advantageous, and when done correctly, it increases security and convenience.

    Related: Here’s Why Passwordless Authentication Is Better for the Business Environment

    Why businesses should consider going passwordless right now

    When businesses adopt passwordless, they must first identify the drawbacks of using passwords and feel the benefits of a passwordless future. In that context, it is essential to consider security, authenticity and applicability. The critical justifications for businesses to take the passwordless route are outlined in the list below.

    Get rid of exhausting password management:

    For users, it’s easy to mistype or forget passwords for their accounts. They eventually develop weak passwords like p@ssw0rd or Password*12345 to make them easier to remember. Moreover, many users tend to write them down on sticky notes or save them in a computer document, compromising critical information security.

    However, there are no passwords to remember with passwordless authentication since they only involve authentication factors like email or SMS OTP, magic links and biometrics. Also, businesses can save users’ time by eliminating the need to hunt up the right passwords or frequent password resets, thereby making the user experience seamless.

    Reduce the cost of IT support:

    According to Forrester research, businesses spend up to $1 million annually on equipment and personnel to handle password resets. Fortunately, password-related expenditures, including password storage and administration costs, can be drastically reduced with passwordless authentication.

    Decrease the likelihood of password-based attacks:

    Businesses are becoming increasingly susceptible to password-based attacks, but only a few are equipped to defend against them. Passwords are highly vulnerable to cyber attacks, which can be deceptively subtle and take various forms. However, by using passwordless authentication, this risk is minimized. Going passwordless necessitates an initial infrastructure investment, but it can eventually lower the cost of password management.

    Users’ information is safer when passwords are eliminated:

    Years of experience have made it easy for cyber criminals to guess, steal or acquire passwords. For instance, Microsoft reported that 44 million accounts were at risk of account takeover due to stolen or compromised passwords.

    Also, a Google poll revealed that 65% of users repeat passwords across numerous accounts or websites. Given these statistics, it is probable that passwords have already caused threats and will continue to do so to the detriment of businesses and their users. Businesses cannot fully influence users’ behavior, but by going passwordless, they may decrease the likelihood of a cyber attack.

    Passwordless authentication increases conversion rates:

    Businesses that make login processes more seamless for users get higher conversion rates. When logging in with passwords, users often give up halfway through the procedure since they find it too difficult or time-consuming to complete. For instance, VTEX, a cloud-based ecommerce platform, claims that getting rid of password-based logins that reduce login friction can increase conversions by up to 54%.

    Related: Passwords Are Scarily Insecure. Here Are a Few Safer Alternatives.

    The aforementioned reasons are some critical aspects that should drive businesses to adopt passwordless as soon as possible.

    Since the risks associated with passwords continue to rise, businesses must swiftly move on from passwords in preference for efficient passwordless multi-factor authentication systems. Businesses that implement it correctly will increase security while enhancing user comfort for authentication. The decision to start a passwordless journey depends on your business model and needs.

    Going passwordless is more likely to be an evolutionary rather than a revolutionary process. Even though it won’t happen overnight, businesses can gradually transition to a passwordless future by carefully planning their strategy and roadmap toward the end vision. And businesses aware of all the considerations and standards will be in a good position to design a passwordless journey to prevent identity threats, provide excellent digital experiences and increase brand exposure.

    [ad_2]

    Deepak Gupta

    Source link

  • 3 Ways Leaders Can Use Data to Grow in Shrinking Economies | Entrepreneur

    3 Ways Leaders Can Use Data to Grow in Shrinking Economies | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    According to the International Monetary Fund, advanced economies will see an especially pronounced growth slowdown, from 2.7% in 2022 to 1.3% in 2023. Tech leaders are facing economic headwinds, yet encounter continuous pressure to maintain aggressive revenue growth in an increasingly competitive global landscape, which begs the question: How do I shift from a strategy of growth at all costs to efficient, sustainable growth?

    Leaders need to find a way to make sense of this dynamic environment and use it to their advantage. But the growth tactics that worked yesterday will not get us through these unprecedented times.

    Related: How (and Why) You Need to Put Sustainability and Community Ahead of Fast Growth

    Against the odds

    As a CEO, you’re under a lot more scrutiny, so you need to have a way to make the best decisions while being able to provide logic.

    Changing economies are an opportunity to reevaluate decisions across the entire organization and find ways to increase throughput while doing more with less. Data-driven insights are how leaders navigate the rapidly changing market. They are how leaders lay down a foundation for long-term success, even in a down economy.

    I’ve worked as an executive through the dotcom bust, the tumultuous financial crisis of 2008, Covid-19 and whatever’s happening right now. Throughout these adverse economic conditions, here’s how objective data fuels growth strategies in even the most difficult of times.

    1. Find inefficiencies in your go-to-market engine

    Changing economies are an opportunity to reevaluate decisions across your entire organization and find ways to increase throughput. To hit the same revenue targets with fewer resources, you have to cut the waste out of your GTM engine, for example:

    • Misallocating resources to unproductive markets
    • Inequitable or incorrectly prioritized sales territories
    • Inefficient account scoring and targeting
    • Spray and pray sales and marketing campaigns

    Many companies are finding success by simplifying their strategy to survive the downturn. This means leveraging available technology to increase the amount of first-party data you have and using this information to make strategic, data-driven decisions. Data should be driving choices around the types of target customer accounts, industries and segments that teams focus on:

    • Where have you had the most success so far?
    • How can you use that information to predict future successes?
    • When are customers/prospects dropping off?
    • Are customers successful in using my product/service?
    • What are the factors contributing to churn?

    Related: 3 Tried-and-True Strategies to Help Marketers Navigate Turbulent Economic Conditions

    2. Use data to size your market and sell more effectively

    After looking inward, leaders must use data to look outward — to size markets, identify prospects, segment and score accounts and personalize the customer experience.

    Down economies are an opportunity to ask yourself:

    • Can you uncover more opportunities? Can you decrease customer acquisition cost (CAC)?
    • How are your territories aligned with our total addressable market(TAM), serviceable addressable market (SAM) and servicable obtainable market (SOM)?
    • How can I improve my territory planning and allocation to increase productivity and sales rep success/retention?
    • Have I identified all competitive displacement or complementary offering opportunities?
    • What can you do differently that hasn’t been tried yet?

    Using data to size your markets helps you produce more predictable, efficient outcomes and increase ROI from your campaigns and individual contributors. These choices will have an impact on your bottom line for years to come and are especially important in down economies.

    3. Aligning teams around data and goals

    Data isn’t one size fits all — leaders need to understand what types of data and how to use it depending on which department, product or strategy. At the same time, your teams need to be working together toward the same goals using the same data and terminology to drive decision-making, especially when facing difficult economic conditions.

    For leaders, shrinking economies are also an opportunity to reprioritize accounts, rethink marketing campaign targeting and align your sales and marketing efforts to drive alignment and efficiency — all powered by data-driven insights. Typically, leaders look immediately toward cost-cutting measures in a bear market, but it is also time to reassess this short-term strategy. A shrinking economy is a time to be proactive, to use capital to take advantage of a shifting ecosystem — particularly in the B2B tech sector, which has historically done well or rebuilt stronger from the rubble. But knowing where to deploy your capital is an important part of this equation. Leaders must leverage the below data-driven insights to capitalize on down economies and turn headwinds in their favor:

    • IT spend, tech installs, hardware and tech stack, buyer intent
    • Vendor market penetration to find threats, trends and well as competitive displacement and complementary offering opportunities
    • Untapped market potential by uncovering gaps and whitespace in your markets
    • Contract insights (who are an account’s providers, for how long, what are the account’s renewal timelines, and more)
    • Intent-to-buy signals
    • Spend analysis (how much an account spends broken down by technology category and providers)

    With market intelligence and technology intelligence, leaders can develop insight-driven strategies to optimize resource allocation based on revenue potential, accounts with adequate budgets and compatible technology stacks, find threats, trends and opportunities.

    Related: 3 Tips to Achieve Growth in 2023 Through Data-Driven Marketing Strategies

    Growing while others shrink

    “Past performance is not indicative of future results.” We’ve all seen this disclaimer before, and it’s true — what worked yesterday will not get us through these unprecedented times. But what if, as a leader, you could deliver predictability — even in the least predictable times, insights into IT spend, technology install, tech stack and other customizable criteria to identify opportunities for growth benefit everyone in an entire company, from department to department, use case to use case.

    It works, I’ve seen it. Even in this unpredictable economy, objective data has empowered not only my customers, but the entire industry.

    [ad_2]

    Elizabeth Cholawsky

    Source link

  • Been Hacked? These are Your Next Steps | Entrepreneur

    Been Hacked? These are Your Next Steps | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Data is the most valuable asset in today’s interconnected world, where ones and zeroes reign supreme. However, securing every last byte of the predicted 181 zettabytes of data that will be consumed by 2025 is a dystopia in and of itself. So, as a business leader, it’s not a matter of if but when your organization will face a cyber incident.

    Immediate financial losses aren’t the worst part of a data breach. In fact, the lasting effects are the more troublesome ones. Long-term implications of a data breach spread across a company and impact its reputation, customers, workforce, databases and even its network architecture.

    How you react following an attack has an enormous influence on the effectiveness of your recuperation efforts and the long-term viability of your organization. In this article, we will explore the essential steps business leaders should take and the pitfalls to avoid in the challenging journey after a hack.

    Related: How to Protect Your Customers (and Your Brand) From Data Breaches

    Essential steps in the wake of a data breach

    Much like death and taxes, cyberattacks are now a part of everyday life. By following a prepared strategy, the actions you take can maintain data security, significantly reduce risk and help mitigate some of the fallout.

    The first hours and days following a cyberattack are crucial. Unfortunately, in many cases, weeks and months can pass before companies realize they are breached. The sooner you respond, the better your chances of minimizing its impact on your organization. Quickly finding breached endpoints and servers and rapidly segregating them should be prioritized. This strategy prevents lateral movement within the corporate network and hinders dangerous code from infecting further systems.

    Successful containment brings us to the next phase — assessing the scope of the hack. A major part of efficient recovery depends on knowing how large the breach is. Conduct a thorough investigation to determine what data has been compromised and how it could affect your company’s operations. Before restarting operations, do a comprehensive analysis, uncover any vulnerabilities, fix them and ensure all affected systems are secure. Depending on the scope and resources of your in-house IT team, you can either employ vulnerability management tools or engage the expertise of a seasoned cybersecurity firm.

    Related: Cybercrime Will Cost The World $8 Trillion This Year — Your Money is in Danger. Here’s Why Prioritizing Cybersecurity is Crucial to Mitigate Risk

    Perform a thorough evaluation of your current security protocols, policies and technologies when there is even a slight indication of a breach. Identify any vulnerabilities or loopholes that were exploited during the assault and put strong measures in place to stop similar attacks in the future.

    The primary actions to consider here include implementing a Secure Access Service Edge solution (SASE), an Identity Access Management solution (IAM), Endpoint Threat Detection and Response (EDR) cloud security solutions and a combination of Unified Endpoint Management (UEMs) and endpoint security solutions. Regardless of the blend of tools and solutions you choose, the end goal should always be to promote a culture of zero trust in the digital landscape.

    Employees tend to be the most vulnerable branch of a company’s security architecture. Cybercriminals exploit these human vulnerabilities through social engineering and phishing attacks. Reports show that 74% of all attacks last year were instigated due to human error. So, routinely instruct your employees on cybersecurity best practices, highlighting the need to use strong passwords, spot phishing scams and adhere to safe protocols. When executed successfully, employee education is a strong deterrent against future assaults.

    Like a seasoned gladiator ready for battle, merely arming yourself for the hack is insufficient; you must also be prepared to defend yourself from attacks. Frequently put your crisis response plans to the test and refine them via simulated exercises. Through such drills, you can identify any shortcomings or deficits in your response capabilities and fine-tune the process. A well-trained team can react swiftly and efficiently to reduce the damage brought on by a breach.

    Critical mistakes to avoid post-hack

    Recovering from a hack is a strenuous and exhausting endeavor, and there are certain obstacles or pitfalls to avoid that could turn a fiery blaze into a roaring inferno.

    The most important thing is that there is no room for denial. Hiding a breach under the rug or downplaying its severity only worsens the situation and builds distrust among stakeholders. Transparency is crucial after a cyberattack. Inform your staff, clients, business partners and the proper authorities as soon as possible about the incident and its severity. It’s also important to control your reputation and communicate effectively. Ignoring public relations can have a long-lasting negative effect on your brand and customer loyalty.

    Another mistake is overlooking the importance of cybersecurity insurance. Cyber insurance is a critical part of any company’s risk management strategy. Even companies with robust security systems are susceptible to hacking, and cyber insurance may help shield them from the resulting financial fallout. The global average cost of a single data breach was $4.25 million last year. Compared to that, the cost of a comprehensive insurance policy is only a fraction of that amount.

    Related: The Top 3 Mistakes Businesses Make After a Hack

    Bottom line

    A cyberattack is likely to happen to any organization that functions digitally, but how an organization responds to such an incident matters. Successfully navigating the path to recovery helps organizations emerge stronger, more resilient and better prepared to turn victimhood into vigilance. Life following a hack presents an opportunity to grow and fortify your organization against new threats looming over the horizon.

    [ad_2]

    Apu Pavithran

    Source link

  • Store More With 20TB of Cloud Storage Space, Just $99.99 for Life | Entrepreneur

    Store More With 20TB of Cloud Storage Space, Just $99.99 for Life | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    Statista reports a downward trend in the amount of hard drives shipped in the past decade. This is not due to businesses needing less storage space on their devices, if anything, it’s the opposite. It’s more likely that more companies are switching to cloud storage for newfound levels of security and convenience.

    It may be time for you to make the switch as well, no matter if you’re a working professional or the boss. Right now, you can get 20TB of secure cloud storage with Prism Drive for just $99.99 (reg. $1,494) — that’s the best price you’ll find on the web.

    Secure, convenient, and roomy.

    There’s a number of reasons to switch to cloud storage. For one, if anything would ever happen to your smartphone, tablet, or computer, your files, photos, and videos would be safely stored in the cloud. And two, it would allow you to access files seamlessly across devices, even if you have a mix of Windows, Mac, Android, or iOS.

    Prism Drive is an excellent choice since you can upload any type of file from any device with 20TB of space. That’s plenty of room for thousands, even hundreds of thousands, of photos, videos, and other files. Also, unlike other cloud storage platforms, you’ll get lifetime access after a one-time payment with no recurring charges.

    Unlock a new way of organizing your business.

    Depending on your exact line of work, you may discover even more uses with Prism Drive. Create shareable links of files that you can send to colleagues or clients. Quick preview allows them to view videos, text, images, or even Microsoft Office files without having to download them first. You may also appreciate high-grade, zero-knowledge encryption to safeguard your files from potential hackers or cybercriminals.

    Live the cloud storage lifestyle with 20TB of secure space with Prism Drive, now available here at its lowest price ever, just $99.99 (reg. $1,494).

    Check out this deal and others included in the Back-to-School Collection.

    Prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • Get 1TB of Cloud Storage for Life for $119.97 With This Back-to-School Sale | Entrepreneur

    Get 1TB of Cloud Storage for Life for $119.97 With This Back-to-School Sale | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    Whether you’re a time strapped entrepreneur or you work for one, you may appreciate the flexibility and a better work-life balance but struggle in other areas like staying organized. When you’re always between home and the office it’s tough to stay connected and focused.

    Something that may help is a seamless cloud storage solution that allows you to keep all of your files in one place and access them from anywhere. As part of this huge Back-to-School savings event now through August 13, get 1TB of Koofr cloud storage for only $119.97 (reg. $810) when you use code KOOFR at checkout.

    Manage your work life within one platform.

    Unlike other cloud storage platforms that charge monthly fees, Koofr gives you lifetime access after a one-time payment. There’s no limitations on the types of files, their size, or which devices you can access them from. Upload Microsoft Office files from your computer and reference them later from your phone, from anywhere.

    Koofr keeps your files organized with features like advanced renaming options and a duplicate file finder and remover. Plus, if you already have some cloud storage through other platforms like Dropbox, Google Drive, or OneDrive and you don’t want to juggle multiple apps, you can access them all within Koofr.

    Plenty of storage for any professional.

    If you’re wondering if 1TB of storage will be enough for you, here’s some estimates of what you could store: 250,000 12MP photos, 500 hours of HD video, or 6.5 million document pages. Whether you want to keep your projects in the cloud for safekeeping, or be able to work across devices, Koofr may be the storage solution for you.

    Take advantage of this Back-to-School savings event that’s not just for students. Get a lifetime subscription to Koofr Cloud Storage 1TB for only $119.97 (reg. $810) until August 13 at 11:59 p.m. Pacific when you use code KOOFR at checkout.

    Check out this deal and others included in the Back-to-School Collection.

    Prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • This $20 Training Bundle Could Help Your Freelance IT Business Grow | Entrepreneur

    This $20 Training Bundle Could Help Your Freelance IT Business Grow | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    The freelance industry is growing constantly, with Techjury reporting more than 73 million active freelancers in the U.S. alone. If you’re running your own business as a freelance programmer, IT specialist, or cybersecurity consultant, you may already be feeling the effects of the competition. If you want something concrete you can show your prospective clients that demonstrates your expertise, you may want to get CompTIA-certified.

    Certification exams are tough, but the Back-to-School season is also a chance to get back in the swing of your own education. And Entrepreneur readers can also take advantage of a Back-to-School Sale and get this All-in-One CompTIA and IT Lifetime Training Bundle from the expert instructors at Exams Digest. This study pack comes with labs, exercises, and more for $19.97.

    Prep for your IT certifications.

    CompTIA certification exams aren’t easy, but they may be more manageable if you’ve taken the time to study the materials. This unique bundle comes with practical study materials that you can use as an independent learning resource or as test prep. Learn more about penetration testing, network security, and Linux computing in labs and PBQs that put your cybersecurity skills to the test.

    If you’re still learning to code, follow along in Python Programming for Beginners. This bundle comes with unlimited Python and Linux exercises, so there’s always something new to practice. Plus, the content updates all the time, so your lifetime investment just keeps building on itself.

    Save on a lifetime of IT study materials.

    Tech freelancers can help their business grow by getting CompTIA certified and showing clients exactly what you can do for them.

    Until August 13 at 11:59 p.m. Pacific, get the Exams Digest 2023 All-in-One CompTIA and IT Lifetime Training Bundle for $19.97. No coupon needed.

    Check out this deal and others included in the Back-to-School Collection.

    Prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • How Cyber Criminals Are Weaponizing Generative AI | Entrepreneur

    How Cyber Criminals Are Weaponizing Generative AI | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    The rapid evolution of artificial intelligence (AI) has brought about significant advancements in various sectors. However, the same technology that now powers our daily lives can also be weaponized by cybercriminals. In fact, we already know AI is being used by hackers. A recent spike in social engineering attacks leveraging generative AI technology has raised alarm bells in the cybersecurity community.

    Generative AI, exemplified by tools like OpenAI’s ChatGPT, uses machine learning to generate human-like text, video, audio and images. While these tools have numerous beneficial applications, they are also being exploited by malicious actors to carry out sophisticated social engineering attacks. The advanced linguistic capabilities and accessibility of generative AI tools create a breeding ground for cybercriminals, enabling them to craft convincing scams that are increasingly difficult to detect.

    Moreover, generative AI can automate the personalization of social engineering attacks on a mass scale. This development is particularly concerning as it erodes one of our most potent defenses against such threats — authenticity. In the face of phishing and similar attacks, our ability to discern genuine communications from fraudulent ones is often our last line of defense. However, as AI becomes more adept at mimicking human communication, our “BS radar” becomes less effective, leaving us more vulnerable to these attacks.

    Related: Safeguarding Your Corporate Environment from Social Engineering

    How cyber criminals are weaponizing generative AI

    A recently published research analysis by Darktrace revealed a 135% increase in social engineering attacks using generative AI. Cyber criminals are using these tools to hack passwords, leak confidential information and scam users across a number of platforms. This new generation of scams has led to a surge in concern among employees, with 82% expressing fears about falling prey to these deceptions.

    The threat of AI, in this context, is that it substantially lowers or even eliminates the barrier of entry to fraud and social engineering schemes. Non-native or poorly skilled native speakers benefit from generative AI, which allows them to have error-free text conversations in any language. This makes phishing schemes much harder to detect and defend against.

    Generative AI can also help attackers bypass detection tools. It enables the prolific production of what could be seen as “creative” variation. A cyber attacker can use it to create thousands of different texts, all unique, bypassing spam filters that tend to search for repeated messages.

    In addition to written communication, other AI engines can produce authoritative-sounding spoken words that can imitate specific people. This means that the voice on the phone that seems like your boss may well be an AI-Based voice-mimicking tool. Organizations should be ready for more complex social engineering attacks that are multi-faceted and creative, such as an email followed by a call imitating the sender’s voice, all with consistent and professional-sounding content.

    The rise of generative AI means that bad actors with limited English skills can quickly create convincing messages that seem more authentic. Previously, an email riddled with grammatical errors, claiming to be from your insurance agency, was promptly recognized as a fraud and immediately disregarded. However, the advancement of generative AI has significantly eliminated such apparent indicators, making it harder for users to differentiate between authentic communications and fraudulent scams.

    Indeed, tools like Chat-GPT have built-in limitations designed to prevent malicious use. For instance, OpenAI has implemented safeguards to prevent the generation of inappropriate or harmful content. However, as recent incidents have shown, these safeguards are not foolproof. A notable example is the case where users were able to trick ChatGPT into providing Windows activation keys by asking it to tell a bedtime story that included them. This incident underscores the fact that while AI developers are making efforts to limit harmful usage, malicious actors are constantly finding ways to circumvent these restrictions, proving that safeguards on AI tools are not a defense mechanism we can count on.

    Related: This Type of Cyber Attack Preys on Your Weakness. Here’s How to Avoid Being a Victim.

    How to protect yourself and your organization from AI-driven social engineering attacks

    The defense against these threats is multi-faceted. Organizations need to make use of real-time fraud protection capable of detecting more than the usual red flags that scream fraud. Some experts suggest fighting fire with fire and using advanced learning methods to determine suspicious attempts and potentially discover AI-generated phishing texts.

    To defend against AI-driven social engineering attacks and ensure robust personal security, we must adopt a multi-faceted approach. This includes using strong and unique passwords, enabling two-factor authentication, being wary of unsolicited communications, keeping software and systems updated and educating oneself about the latest cybersecurity threats and trends.

    While the emergence of free, simple, accessible AI benefits cyber attackers enormously, the solution is better tools and better education — better cybersecurity all around. The sector must initiate strategies that pit machine against machine, rather than human versus machine. To achieve this, we need to contemplate sophisticated detection systems capable of identifying threats generated by AI, thereby decreasing the duration for identification and resolution of social engineering attacks emanating from generative AI.

    In conclusion, the rapid advancements in generative AI technology present both opportunities and risks. Moving forward, the increasing risk of social manipulation through AI-enriched tactics necessitates heightened awareness and precaution from both individuals and entities. They must utilize comprehensive cybersecurity strategies to outmaneuver potential adversaries. We are already living in an era where generative AI is leveraged in cyber criminal activities, hence it’s essential to stay alert, ready to counteract these threats using all available resources.

    Related: 5 Ways to Protect Your Company From Cybercrime

    [ad_2]

    Yehuda Leibler

    Source link

  • Streamlining Your Tech Stack to Unleash Maximum Efficiency | Entrepreneur

    Streamlining Your Tech Stack to Unleash Maximum Efficiency | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    Amid escalating economic uncertainty due to inflation and a potential downturn, companies are increasingly gravitating toward cost-cutting measures and investment reduction. However, a more sustainable solution could lie in streamlining processes and bolstering operational efficiencies.

    Most businesses look to reduce spending, with the software and digital technology sectors heavily targeted. But this isn’t the only option. Rather than reducing your investments in this area, you could look more closely at your current activities in the digital arena, to first identify and then address inefficiencies. With this approach, you could reduce costs without actually hampering your capacity to serve your customers’ needs or scale up operations.

    Related: This Tech Leader Breaks Down How You Can Avoid Business Disaster With This Often-Overlooked Tactic

    Completing your tech stack audit

    Your tech stack audit should classify each technology according to use:

    • Marketing
    • Sales
    • Customer success
    • Ops and analytics

    This type of breakdown will facilitate a more organized approach to testing and evaluation. This necessary audit helps determine the overall return on your investment of each tool and how it contributes to the company’s operations, seamless internal and customer communication and objectives.

    Furthermore, the data you collect and analyze should shed light on the most important metrics, such as sales velocity and conversion rates.

    Your tech stack includes the software, web applications and tools needed to construct functional websites — for your customers and you.

    To deliver great results, your digital interfaces and applications should be fast, well-organized and straightforward. One or two poorly chosen technologies can hinder performance by introducing inefficiencies that can cost both time and money, and by making it more difficult to complete sales, or collect and process essential data.

    Greater diversification in the tasks required by their users have caused tech stacks of today to become increasingly byzantine in their structures, resulting in an increase of both the types of digital devices needed to access online portals and in the volume of data that sites are now required to process. Businesses with an online presence are expected to do more in the digital environment than before..

    This increases the likelihood of inefficiencies developing due to incompatibilities with software that doesn’t integrate smoothly with other technologies in your stack. For optimum efficiency and integration, your first step should be to evaluate each technology.

    Your tech stack audit should classify each technology according to whether it’s used for marketing, business development, analytics, customer support or sales. This type of breakdown will facilitate a more organized approach to testing and evaluation, as your evaluators go through each category one at a time.

    Finding the inefficiencies that sabotage your business

    There may be multiple inefficiencies hidden deep within your tech stack. In your relentless efforts to uncover obstacles that might negatively impact profitability, here are some critical aspects of your business operation you should be evaluating.

    Related: Your Tech Employees Are Your Most Potent Reputational Tool as Your Firm Recruits

    Data collection

    You can choose a set of tools that functions in a perfectly coordinated manner, but it doesn’t benefit you if the right data are not being collected, analyzed and communicated.

    The data you collect and analyze should shed light on the most important metrics, such as sales velocity and conversion rates. If you aren’t getting actionable data that helps you streamline your operations or strengthen your relationships with your customers, you may need to eliminate some tools from your stack or replace them with newer technologies.

    Business processes

    If you haven’t already done so, you should add software to your tech stack that can automatically calculate prices for the customized products and services you provide. Trying to handle CPQ (configure-price-quote) responsibilities the old-fashioned way, via human calculation, will take too much time and increase the chances of miscalculation.

    Customer retention services

    You need to differentiate your strategic customers (your most loyal and active supporters) from those who are less committed. While the customer service you provide should be diversified and personalized to meet the needs of both constituencies, you shouldn’t waste time and money on services aimed at low-value customers — a negative return on investment is highly likely.

    Marketing

    You need to analyze your current marketing efforts carefully and with a skeptical, even critical eye. You need to know if you’re getting an acceptable return on investment, which means reaching your targeted audience with a message that resonates. If your ROI is lacking, your present marketing strategies should be sent packing.

    CRM capabilities

    Your customer relationship management (CRM) platform is the hub of your operations, and as such, you can’t afford to choose or keep a product that doesn’t fully support the implementation of your business plan.

    You shouldn’t assume that any CRM platforms like HubSpot, Salesforce or Zoho are automatically right for everyone. And while one, all three or others may very well be, you should carefully evaluate the strengths and the weaknesses of your current CRM choice and be prepared to switch to another option with capabilities that are more closely aligned with your unique and vital needs.

    Scalability

    Your technology ecosystem should always be scalable, no matter how rapidly your growth occurs. Your software should be able to accommodate increases in customer engagement and sales volume without creating logjams or bottlenecks that require technological additions, subtractions or substitutions.

    Related: Want Tech Workers to Stick Around Longer? Think 30 Years — Not 3.

    Greater efficiency will give you the edge

    The kind of exhaustive tech evaluation proposed here is not for the faint of heart. It’s a meticulous and comprehensive process that will take time, effort and extraordinary attention to detail, whether you hand the responsibility over to an in-house vetting team or contract outside experts to perform the job for you.

    What you’re really doing when you undertake such a process is signaling a revolution in your way of thinking. A comprehensive review of your technology choices can help you refine, retool or redevelop your go-to-market (GTM) strategies without cutting your investment in your business, which you now realize is the best way to survive difficult times. The changes you make afterward will give you a leg up on the competition, providing you with a real opportunity to scale up while others are only thinking about scaling back.

    [ad_2]

    Catherine Mandungu

    Source link

  • Learn About Cybersecurity From Home For Just $49.97, the Best Price Online | Entrepreneur

    Learn About Cybersecurity From Home For Just $49.97, the Best Price Online | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    Looking to switch career paths? According to Zippia, 37% of workers in the U.S. either changed or lost their job in 2020. Whether you are among those people who are hoping to start in a brand-new field, or you would simply like to help beef up your company’s cybersecurity without having to outsource the job, getting educated can be a big help.

    These days, you don’t have to step foot in a classroom to learn new skills. In fact, you can learn them from the comfort of your own couch with The Complete 2023 CompTIA Certification Course Super Bundle by Iducate. This bundle of 13 intensive courses can start you on the path to cybersecurity, and right now it’s just $49.97 — less than $4 a course and the best price on the web — for a limited time right here.

    https://www.youtube.com/watch?v=Ebxge_ldzGM

    If you’ve been living under a rock, you might not realize the real threat cyber criminals are to businesses today. That means that companies are actively seeking cybersecurity personnel to help protect their information and digital assets…which creates a potentially very lucrative career field.

    You’ll get instruction from Iducate (formerly iCollege), which provides comprehensive online IT training service taught by professionals, so you’ll be in very good hands. They’ll guide you through the information you need to seek CompTIA certifications right on your device. CompTIA certifications help you get ahead in the cybersecurity field, with courses like CompTIA IT Fundamentals+ (FC0-U61) getting you schooled in the basics before you dive into certifications like Network+, Security+, Cloud+, and more.

    Let The Complete 2023 CompTIA Certification Course Super Bundle by Iducate help you understand cybersecurity, on sale now for the best price on the web at $49.97 (reg. $195) for a limited time.

    Prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • Save More Than 82% Off a Lifetime of Cloud Storage | Entrepreneur

    Save More Than 82% Off a Lifetime of Cloud Storage | Entrepreneur

    [ad_1]

    Disclosure: Our goal is to feature products and services that we think you’ll find interesting and useful. If you purchase them, Entrepreneur may get a small share of the revenue from the sale from our commerce partners.

    Nobody enjoys running out of storage space on their computer or phone, but it’s especially irritating for entrepreneurs. Your business runs on data, and if you can’t accept more files, things are bound to start falling through the cracks.

    That’s why it’s so important to have a quality cloud storage provider, and Koofr gives you more storage than the leading giants combined at a lower cost. You can get lifetime access to 1TB of storage for just $119.97 if you order by July 23 at 11:59 p.m. Pacific and enter coupon code KOOFR at checkout.

    This intuitive, private cloud storage service lets you easily connect your existing cloud accounts (Dropbox, Google Drive, Amazon, and OneDrive) to give you a central source of truth for all of it. You can access Koofr via web, mobile, and WebDav, and enjoy transfers with unlimited file sizes and a massive 1TB library.

    Once you’re connected, Koofr offers tools to enhance your organization, like a duplicate finder to help you find and remove duplicate files to maximize your space, and an advanced renaming option to effectively rename many files at once for more effective organization.

    Koofr doesn’t scrimp on security either. Files are encrypted both in rest and in transfer, and Koofr is the only cloud storage provider that doesn’t track your activity. That’s part of the reason why Koofr has earned 4.3/5 stars on Trustpilot and 4.6/5 stars on Capterra, GetApp, and G2.

    Every entrepreneur needs a viable cloud storage solution, and Koofr delivers all of your cloud storage needs for life.

    Now through July 23, pay just once to get lifetime access to 1TB of Koofr Cloud Storage for just $119.97 (reg. $810) with coupon code KOOFR.

    Prices subject to change.

    [ad_2]

    Entrepreneur Store

    Source link

  • How to Detect and Prevent Accounts Payable Fraud | Entrepreneur

    How to Detect and Prevent Accounts Payable Fraud | Entrepreneur

    [ad_1]

    Opinions expressed by Entrepreneur contributors are their own.

    This story originally appeared on Under30CEO.com

    Business fraud is real. According to a report by the Association of Certified Fraud Examiners, “U.S. Businesses will lose an average of 5% of their gross revenues to fraud.”

    One of the most common types of fraud is accounts payable fraud. This refers to anytime a business-to-business (B2B) payment occurs illegally. AP fraud can be committed by employees, vendors, suppliers, cybercriminals or scammers.

    There are two main types of AP fraud: internal and external AP fraud. Let’s go over both.

    Internal AP fraud

    Internal fraud starts with someone from within the organization. This could be a billing scheme in which bills are paid to fraudulent beneficiaries posing as legitimate ones.

    Related: 4 Ways to Protect Your Business Against Employee Fraud and Theft

    It could also be employee reimbursement fraud, in which an employee creates false expense claims that they have the business reimburse them for.

    Another form of internal AP fraud is kickback fraud. This is when an employee works with an outside bad actor, sends them funds fraudulently, and shares the profits (hence the kickback).

    External AP fraud

    External AP fraud starts with someone outside the company. It could take the form of a wire transfer scam, in which the perpetrator pretends to be a legitimate vendor and asks the company to transfer funds to a nefarious bank account.

    Similarly, external AP fraud could be a phishing attack, in which the attacker tries to gain access to the business’s computer system with a virus disguised as a link. Identity theft is another form of external AP fraud. This is when someone steals ID information from an employee and uses it to gain access to AP funds.

    In some cases, external AP fraud happens through an account takeover. This is when someone gets access to AP information and starts making fraudulent payments to themselves or others.

    How to detect AP fraud

    To prevent AP fraud (and the massive losses that can come with it), a business needs to take serious precautions. Fraud can be hard to detect, so you must take extra care to have preventative systems in place.

    Related: How AI and Machine Learning Are Improving Fraud Detection in Fintech

    Here are some tips on how to detect and prevent AP fraud:

    • Look for anomalies. If an invoice or payment looks off, take a closer look. Any irregularities should be investigated.
    • Automate AP processes. Instead of relying on manual data entry, use accounts payable automation software. This helps prevent human errors and maximizes cybersecurity.
    • Perform regular audits. Make a habit of regularly reviewing AP processes. This can help expose vulnerabilities that need to be addressed.
    • Educate staff on best security practices. Well-meaning employees can sometimes take dangerous security risks. Make sure they know the best cybersecurity practices such as creating strong passwords and using a VPN.
    • Pay attention to red flags. These can include invoices with the same address as an employee or only a P.O. box, duplicate vendors, missing checks and signatures, complaints by suppliers about late or non-payments, odd employee behavior, and more.
    • Stay up to date on the latest fraud strategies. Criminals change their tactics all the time. So it’s important to stay on top of the latest trends in online fraud.

    Accounts payable fraud is a risk for every business. Whether your business is big or small, now is the time to make accounts payable fraud detection and prevention a priority.

    [ad_2]

    Under30CEO Staff

    Source link