CYBER Insights » CYBER INSIGHTS: Friday 24 May 2024 – Today’s SME Cybersecurity News & Intelligence

CYBER INSIGHTS: Friday 24 May 2024 – Today’s SME Cybersecurity News & Intelligence

Image Credit: IfOnlyCommunications | Cybersecurity Journalist, Cyber Insights, SME Cybersecurity News,
Image Credit: IfOnlyCommunications

Gibraltar: Friday  24th May 2024 at 07:00 CET

CYBER INSIGHTS: The Latest SME Cybersecurity News & Intelligence …
Written & Curated By Iain Fraser – Cybersecurity Journalist,
IainFRASER.net/CYBERInsights
SME Cyber Insights

#SMECyberInsights #SMECybersecurityNews 

Welcome to Today’s Edition of CYBERInsights – My Daily Roundup of the Latest European SME Cybersecurity News including: 1). Cybersecure UK v Cybersecure EU 2). GIAC Cyber 3). MFA /2FA Explained

Image Credit: Kirill_Makes_Pics/Pixabay
Image Credit: Kirril Makes Pics/Pixabay

1). CYBERSECURE UK -v- CYBERSECURE EU: UK has Lowest UK has Lowest Cybersecurity Vulnerabilities in Europe in a first-of-its-kind Analysis by Bitsight the Cybersecurity Risk Management firm who announced the findings in its latest Prevalence and Remediation report a new global view of the CISA KEV Catalog. UK Prevalence -v- Europe for detectable KEV in 2023 was 30.2% with the EU reported as 43.2% with Ransomware incidents for the UK at 17.6% versus 26.6% for the Rest of Europe

2). MUST READ: The 2024 SANS | GIAC Cyber Workforce Research Report – Preparing your Cybersecurity workforce for tomorrow’s challenges. learn how HR and cybersecurity managers can collaborate in crafting and upholding effective hiring and talent management strategies aimed at building a capable cybersecurity team. The Report is based on a first-of-its-kind survey that analyzed the cybersecurity workforce.

3). WHAT IS MFA (2FA) Cyber KPI’sWhat is Multi Factor Authentication (2 Factor Authorisation) and why should SMEs use it? Multi-factor authentication (MFA; two-factor authentication, or 2FA) is a multi-step account login process that requires users to enter more information than just a password. For example, along with the password, users might be asked to enter a code sent to their email, answer a secret question, or scan a fingerprint.

Cybersecurity Journalist, Daily Cyber Insights, SME Cybersecurity,

ABOUT IAIN FRASER – I am a Gibraltar based, Accredited Journalist, (*NUJ, IFJ & ONA) Authority Writer, Industry Influencer & Commentator on all aspects of Cybersecurity [Awareness, Threat Management, Best Practice Compliance & Mitigation] and report throughout Europe.

I also cover the sectors where I have either operational experience or subject matter expert knowledge including: Geopolitics esp. Geocrime, Defence Technology, AI, Autonomous Transport & National Security and contribute to a broad range of European facing news channels, blogs and digital magazines as either Guest Feature Writer, Columnist or Consultant Editor. Email: [email protected] | LinkedIn Bio: IainFraserJournalist

Leave a Reply

Your email address will not be published. Required fields are marked *