muninn.ai - kn

Posts about:

Data Protection (2)

5 Essential Steps to Navigate a Cyberattack

Guide: 5 Essential Steps to Navigate a Cyberattack

Cybercrime comes in various ways. I can cause immediate disruptions like network slowdowns and unsolicited spam emails sent from your account. Data breaches or other attacks might only come to light when an external party notifies you or the cybercriminal itself contacts you. In Denmark alone, there have been over 8,000 registered data breaches annually across various industries in the past three years. Regardless of the nature, swift and strategic action is crucial. In particular small to medium-sized businesses grapple with the increasing menace of cyberattacks. Should you find yourself in a situation like this, we've have put together a guide to steer you through the aftermath of a cyberattack:

Read More

NDR vs. SIEM: Understanding Key Differences and Synergies in Cybersecurity

NDR vs SIEM: Understanding Key Differences and Synergies in Cybersecurity

As we can read in the headlines every day, we are witnessing an escalation of sophisticated cyberattacks, which is in parts propelled by the power of automation. The responsibility of safeguarding against these threats falls on the shoulders of security teams, who often grapple with the challenge of maintaining comprehensive visibility across their entire operational environment.

Read More

Are We Losing it ? - Recent Statistics on Data Breach  

Are We Losing it?  

Recent statistics on data breach    

  • 83% of organizations had more than one data breach in 2022.  
  • 82% of all breaches involved ‘the human element’ (the use of stolen credentials, phishing, misuse or human error) in 2022  
  • Approximately 47% of all cybersecurity incidents involved Personally Identifiable Information (PII), 46% of involved Authentication Credentials and 7% involved Payment Card Data.  
  • 60% of data breaches lead to increases in prices passed on to customers in 2022.  
  • The global average cost of a data breach was $4.35M USD in 2022.  
  • Approximately 814,000 phishing websites were created in 2022.  

Source: https://www.tekspace.com.au/blog/cyber-security-stats-2022/

Read More

The Cybersecurity Cat-and-Mouse Game: How to Outsmart Hackers with Threat Hunting

The Cybersecurity Cat-and-Mouse Game: How to Outsmart Hackers with Threat Hunting

A Threat Hunting Overview

Threat hunting: the art and science of tracking down hidden cyber threats lurking within your organization's network. These malicious footprints are left behind by hackers as they carry out illegal activities, whether it's on a compromised machine or via remote-controlled platforms. In some cases, it can be hard to detect them, and stealthy attackers are able to hide within networks for weeks, if not months. An astonishing 83% of organizations had more than one data breach in 2022 and approximately 47% of all cybersecurity incidents involved Personally Identifiable Information (PII) stolen by cybercriminals.

Read More