CYBER Insights » CYBER INSIGHTS: Thursday 20 June 2024 – Today’s SME Cybersecurity News & Intelligence

CYBER INSIGHTS: Thursday 20 June 2024 – Today’s SME Cybersecurity News & Intelligence

Image Credit: Pete Linforth/Pixabay
Image Credit: Pete Linforth/Pixabay

Gibraltar: Thursday  20 June 2024 at 07:00 CET

CYBER INSIGHTS: The Latest SME Cybersecurity News & Intelligence …
Written & Curated By Iain Fraser – Cybersecurity Journalist,
IainFRASER.net/CYBERInsights
SME Cyber Insights

#SMECyberInsights #EU #Compliance #GDPR #NIS2 #SMECybersecurityNews #CyberAttacks #MFA/2FA

Welcome to Today’s Edition of CYBERInsights – My Daily Roundup of the Latest European SME Cybersecurity News including: 1). Compliance: GDPR & NIS2  2). Cyber Attacks Exploit Weakest Links 3). What is MFA/2FA

1). COMPLIANCE: EU – Regulatory Charges are Looming Fast – Is your SME Ready?
The imminent NIS2 looms affecting EU companies and those operating within the EU. The biggest concern for Small Businesses is lack of Awareness – Trying to understand the minutiae of the Regulations and how they specifically will affect your SME. The CYBERInsights Team have a produced a Definitive working title which fully explains the regulations, your responsibilities and Best-practice execution & deployment.

2) THREAT INTEL:  CYBERATTACKS – Our Guest Contributor Andy Jenkinson | Group CEO Cybersec Innovation Partners reported – Cyberattacks predominantly exploit the weakest links in an organization’s security framework. Cyberattacks predominantly exploit the weakest links in an organization’s security framework, with servers and domains being primary entry points. Despite the glaring evidence, these critical areas remain inadequately secured, managed, and controlled.

3). WHAT IS MFA (2FA) Cyber KPI’sWhat is Multi Factor Authentication (2 Factor Authorisation) and why should SMEs use it? Multi-factor authentication (MFA; two-factor authentication, or 2FA) is a multi-step account login process that requires users to enter more information than just a password. For example, along with the password, users might be asked to enter a code sent to their email, answer a secret question, or scan a fingerprint. protects personal data—which may include personal identification or financial assets

ABOUT IAIN FRASER – I am a Gibraltar based, Accredited Journalist, (*NUJ, IFJ & ONA) Authority Writer,  Commentator & Publisher of CYBERinsights and cover all aspects of Cybersecurity [Awareness, Threat Management, Best Practice Compliance & Mitigation] and report throughout Europe & the UK

In addition to Cybersecurity, I also cover the sectors where I have either operational experience or subject matter expert knowledge including: Geopolitics, Defence Technology, AI & National Security and contribute to a broad range of European facing news channels, blogs and digital magazines as either Guest Feature Writer, Columnist or Consultant Editor.

LinkedIn Bio: IainFraserJournalist
Email: [email protected] | www.iainfraser.net

Translate »