Top Cybersecurity Threats | Cybersecurity Insights #14

Enhance your understanding of key cybersecurity threats, data regulations, and cybersecurity frameworks with this episode of the Cybersecurity Insights series.

Absolute Security•3.8K views•2:57

About this video

Fast-track your understanding of cybersecurity, data regulations, and cybersecurity frameworks with the Cybersecurity Insights series. In this episode, we take a look at the top cybersecurity threats. Visit https://www.absolute.com/blog/?utm_medium=video&utm_source=youtube&utm_content=csi&utm_campaign=enterprise to learn more. First of all, what is a threat? The definition of a threat is: a person or thing likely to cause damage. A cyber attacker profits from stealing your data then selling the information online or buying it to do harm. Top Cyber Threats include: • External attacks – botnet attack, web app seizures, stolen credentials (usually from phishing malware), and exploited vulnerabilities. • Insider incidents – either maliciously like changing or stealing data, or unwittingly through gaining access a user should not have had. • Third-party attack – partners, suppliers, contractors, and even clients who push their own compromises into your environment. • Lost or Stolen assets – when the device is out of sight, anyone can access the data. If we lose visibility and control, risks become more likely; when risks become more likely, they turn into threats. It all about visibility and control. ---- Watch more episodes of the Cybersecurity Insights series: #1 - HIPAA Privacy Rule - https://www.youtube.com/watch?v=FtdvOVh3u28&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #2 - HIPAA Security Rule: https://www.youtube.com/watch?v=cMI_JyiMR9Y&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=2 #3 - HITRUST Cybersecurity Framework: https://www.youtube.com/watch?v=QLu9zcclHo4&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=3 #4 - NIST Cybersecurity Framework: https://www.youtube.com/watch?v=hBpB5Z-Wl6w&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=4 #5 - NIST CSF - Identify: https://www.youtube.com/watch?v=2pCNYNPs-70&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=5 #6 - NIST CSF - Protect: https://www.youtube.com/watch?v=gdWv3NJKzSs&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=6 #7 - NIST CSF - Detect: https://www.youtube.com/watch?v=0VdtW3Ue3F8&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=7 #8 - NIST CSF - Respond: https://www.youtube.com/watch?v=7VwS3HTAW1M&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=8 #9 - NIST CSF - Recover: https://www.youtube.com/watch?v=94ED4iPB36o&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=9 #10 - Lost/Stolen Device: https://www.youtube.com/watch?v=QYgYTZPnU-Y&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=10 #11 - Data Privacy explained: https://www.youtube.com/watch?v=3YIPQrEWOeY&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=11 #12 - Data Privacy laws: https://www.youtube.com/watch?v=v9I8iDLFtqE&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #13 - Data Privacy Tips: https://www.youtube.com/watch?v=KyAyni3SJmU&index=1&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW #14 - Top Cybersecurity Threats: https://www.youtube.com/watch?v=ZZ5R1diN0OI&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #15 - Phishing and Malware: Difference between Viruses, Trojans, Worms, and Ransomware: https://www.youtube.com/watch?v=aOy9SQxnHKA&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #16 - Zombie Computers, Botnets, and Denial of Service Attacks Explained https://www.youtube.com/watch?v=r-PRBdsEQZA&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #17 - Zero Trust Explained: https://www.youtube.com/watch?v=7Oeo1A5gncQ&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #18 - 5 Most Devastating Cyber Attacks: https://www.youtube.com/watch?v=IJc3viPKXk4&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 #19 - Dealing with IT Complexity: https://www.youtube.com/watch?v=6kvas8uqMuk&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1 ---- Endpoint Risk Report Explore the global trends shaping endpoint risk management strategies, sourced from nearly 5 million endpoints: https://www.absolute.com/go/reports/endpoint-risk-report/?utm_medium=video&utm_source=youtube&utm_campaign=enterprise Find out more about how Absolute Software can help you protect from cyber-attacks: https://www.absolute.com/?utm_medium=video&utm_source=youtube&utm_content=csi&utm_campaign=enterprise
4.5

3 user reviews

Write a Review

0/1000 characters

User Reviews

0 reviews

Be the first to comment...

Video Information

Views
3.8K

Total views since publication

Likes
57

User likes and reactions

Duration
2:57

Video length

Published
Mar 26, 2019

Release date

Quality
hd

Video definition

Captions
Available

Subtitles enabled

Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Morocco under the topic 'météo demain'.

Share This Video

SOCIAL SHARE

Share this video with your friends and followers across all major social platforms. Help spread the word about great content!