Top Cybersecurity Threats | Cybersecurity Insights #14
Enhance your understanding of key cybersecurity threats, data regulations, and cybersecurity frameworks with this episode of the Cybersecurity Insights series.

Absolute Security
3.8K views β’ Mar 26, 2019

About this video
Fast-track your understanding of cybersecurity, data regulations, and cybersecurity frameworks with the Cybersecurity Insights series. In this episode, we take a look at the top cybersecurity threats. Visit https://www.absolute.com/blog/?utm_medium=video&utm_source=youtube&utm_content=csi&utm_campaign=enterprise to learn more.
First of all, what is a threat? The definition of a threat is: a person or thing likely to cause damage. A cyber attacker profits from stealing your data then selling the information online or buying it to do harm.
Top Cyber Threats include:
β’ External attacks β botnet attack, web app seizures, stolen credentials (usually from phishing malware), and exploited vulnerabilities.
β’ Insider incidents β either maliciously like changing or stealing data, or unwittingly through gaining access a user should not have had.
β’ Third-party attack β partners, suppliers, contractors, and even clients who push their own compromises into your environment.
β’ Lost or Stolen assets β when the device is out of sight, anyone can access the data.
If we lose visibility and control, risks become more likely; when risks become more likely, they turn into threats. It all about visibility and control.
----
Watch more episodes of the Cybersecurity Insights series:
#1 - HIPAA Privacy Rule - https://www.youtube.com/watch?v=FtdvOVh3u28&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#2 - HIPAA Security Rule: https://www.youtube.com/watch?v=cMI_JyiMR9Y&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=2
#3 - HITRUST Cybersecurity Framework: https://www.youtube.com/watch?v=QLu9zcclHo4&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=3
#4 - NIST Cybersecurity Framework: https://www.youtube.com/watch?v=hBpB5Z-Wl6w&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=4
#5 - NIST CSF - Identify: https://www.youtube.com/watch?v=2pCNYNPs-70&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=5
#6 - NIST CSF - Protect: https://www.youtube.com/watch?v=gdWv3NJKzSs&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=6
#7 - NIST CSF - Detect: https://www.youtube.com/watch?v=0VdtW3Ue3F8&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=7
#8 - NIST CSF - Respond: https://www.youtube.com/watch?v=7VwS3HTAW1M&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=8
#9 - NIST CSF - Recover: https://www.youtube.com/watch?v=94ED4iPB36o&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=9
#10 - Lost/Stolen Device: https://www.youtube.com/watch?v=QYgYTZPnU-Y&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=10
#11 - Data Privacy explained: https://www.youtube.com/watch?v=3YIPQrEWOeY&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=11
#12 - Data Privacy laws: https://www.youtube.com/watch?v=v9I8iDLFtqE&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#13 - Data Privacy Tips: https://www.youtube.com/watch?v=KyAyni3SJmU&index=1&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW
#14 - Top Cybersecurity Threats: https://www.youtube.com/watch?v=ZZ5R1diN0OI&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#15 - Phishing and Malware: Difference between Viruses, Trojans, Worms, and Ransomware: https://www.youtube.com/watch?v=aOy9SQxnHKA&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#16 - Zombie Computers, Botnets, and Denial of Service Attacks Explained https://www.youtube.com/watch?v=r-PRBdsEQZA&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#17 - Zero Trust Explained: https://www.youtube.com/watch?v=7Oeo1A5gncQ&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#18 - 5 Most Devastating Cyber Attacks: https://www.youtube.com/watch?v=IJc3viPKXk4&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#19 - Dealing with IT Complexity: https://www.youtube.com/watch?v=6kvas8uqMuk&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
----
Endpoint Risk Report
Explore the global trends shaping endpoint risk management strategies, sourced from nearly 5 million endpoints: https://www.absolute.com/go/reports/endpoint-risk-report/?utm_medium=video&utm_source=youtube&utm_campaign=enterprise
Find out more about how Absolute Software can help you protect from cyber-attacks:
https://www.absolute.com/?utm_medium=video&utm_source=youtube&utm_content=csi&utm_campaign=enterprise
First of all, what is a threat? The definition of a threat is: a person or thing likely to cause damage. A cyber attacker profits from stealing your data then selling the information online or buying it to do harm.
Top Cyber Threats include:
β’ External attacks β botnet attack, web app seizures, stolen credentials (usually from phishing malware), and exploited vulnerabilities.
β’ Insider incidents β either maliciously like changing or stealing data, or unwittingly through gaining access a user should not have had.
β’ Third-party attack β partners, suppliers, contractors, and even clients who push their own compromises into your environment.
β’ Lost or Stolen assets β when the device is out of sight, anyone can access the data.
If we lose visibility and control, risks become more likely; when risks become more likely, they turn into threats. It all about visibility and control.
----
Watch more episodes of the Cybersecurity Insights series:
#1 - HIPAA Privacy Rule - https://www.youtube.com/watch?v=FtdvOVh3u28&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#2 - HIPAA Security Rule: https://www.youtube.com/watch?v=cMI_JyiMR9Y&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=2
#3 - HITRUST Cybersecurity Framework: https://www.youtube.com/watch?v=QLu9zcclHo4&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=3
#4 - NIST Cybersecurity Framework: https://www.youtube.com/watch?v=hBpB5Z-Wl6w&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=4
#5 - NIST CSF - Identify: https://www.youtube.com/watch?v=2pCNYNPs-70&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=5
#6 - NIST CSF - Protect: https://www.youtube.com/watch?v=gdWv3NJKzSs&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=6
#7 - NIST CSF - Detect: https://www.youtube.com/watch?v=0VdtW3Ue3F8&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=7
#8 - NIST CSF - Respond: https://www.youtube.com/watch?v=7VwS3HTAW1M&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=8
#9 - NIST CSF - Recover: https://www.youtube.com/watch?v=94ED4iPB36o&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=9
#10 - Lost/Stolen Device: https://www.youtube.com/watch?v=QYgYTZPnU-Y&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=10
#11 - Data Privacy explained: https://www.youtube.com/watch?v=3YIPQrEWOeY&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=11
#12 - Data Privacy laws: https://www.youtube.com/watch?v=v9I8iDLFtqE&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#13 - Data Privacy Tips: https://www.youtube.com/watch?v=KyAyni3SJmU&index=1&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW
#14 - Top Cybersecurity Threats: https://www.youtube.com/watch?v=ZZ5R1diN0OI&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#15 - Phishing and Malware: Difference between Viruses, Trojans, Worms, and Ransomware: https://www.youtube.com/watch?v=aOy9SQxnHKA&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#16 - Zombie Computers, Botnets, and Denial of Service Attacks Explained https://www.youtube.com/watch?v=r-PRBdsEQZA&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#17 - Zero Trust Explained: https://www.youtube.com/watch?v=7Oeo1A5gncQ&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#18 - 5 Most Devastating Cyber Attacks: https://www.youtube.com/watch?v=IJc3viPKXk4&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
#19 - Dealing with IT Complexity: https://www.youtube.com/watch?v=6kvas8uqMuk&list=PL94KIXDzCxI-D1GRbaHrEjoty_wc7SaIW&index=1
----
Endpoint Risk Report
Explore the global trends shaping endpoint risk management strategies, sourced from nearly 5 million endpoints: https://www.absolute.com/go/reports/endpoint-risk-report/?utm_medium=video&utm_source=youtube&utm_campaign=enterprise
Find out more about how Absolute Software can help you protect from cyber-attacks:
https://www.absolute.com/?utm_medium=video&utm_source=youtube&utm_content=csi&utm_campaign=enterprise
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
3.8K
Likes
57
Duration
2:57
Published
Mar 26, 2019
User Reviews
4.5
(3) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.