venturebeat.com
Open in
urlscan Pro
192.0.66.2
Public Scan
Submitted URL: https://ww2.kirkpatrickprice.com/e/22582/ss-owners-should-look-out-for-/7m5nwk/1492698379?h=Nzo0qNFeF5frSYBvP-1c_rFbO669wR20MV1rg...
Effective URL: https://venturebeat.com/datadecisionmakers/surprising-cybersecurity-weak-points-business-owners-should-look-out-for/
Submission: On October 11 via api from US — Scanned from DE
Effective URL: https://venturebeat.com/datadecisionmakers/surprising-cybersecurity-weak-points-business-owners-should-look-out-for/
Submission: On October 11 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET https://venturebeat.com/
<form method="get" action="https://venturebeat.com/" class="Search">
<input id="search-input" class="Search__input GlobalNav__text" type="text" placeholder="Search" name="s" aria-label="Search" required="">
<button type="submit" class="Search__submit" aria-label="Search submit button">
<svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
<g>
<path fill-rule="evenodd" clip-rule="evenodd"
d="M14.965 14.255H15.755L20.745 19.255L19.255 20.745L14.255 15.755V14.965L13.985 14.685C12.845 15.665 11.365 16.255 9.755 16.255C6.16504 16.255 3.255 13.345 3.255 9.755C3.255 6.16501 6.16504 3.255 9.755 3.255C13.345 3.255 16.255 6.16501 16.255 9.755C16.255 11.365 15.665 12.845 14.6851 13.985L14.965 14.255ZM5.255 9.755C5.255 12.245 7.26501 14.255 9.755 14.255C12.245 14.255 14.255 12.245 14.255 9.755C14.255 7.26501 12.245 5.255 9.755 5.255C7.26501 5.255 5.255 7.26501 5.255 9.755Z">
</path>
</g>
</svg>
</button>
</form>
GET https://venturebeat.com/
<form method="get" action="https://venturebeat.com/" class="Search Search--mobile Nav__section--active">
<input id="mobile-search-input" class="Search__input GlobalNav__text" type="text" placeholder="Search" name="s" aria-label="Search" required="">
<button type="submit" class="Search__submit">
<svg width="24" height="24" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
<g>
<path fill-rule="evenodd" clip-rule="evenodd"
d="M14.965 14.255H15.755L20.745 19.255L19.255 20.745L14.255 15.755V14.965L13.985 14.685C12.845 15.665 11.365 16.255 9.755 16.255C6.16504 16.255 3.255 13.345 3.255 9.755C3.255 6.16501 6.16504 3.255 9.755 3.255C13.345 3.255 16.255 6.16501 16.255 9.755C16.255 11.365 15.665 12.845 14.6851 13.985L14.965 14.255ZM5.255 9.755C5.255 12.245 7.26501 14.255 9.755 14.255C12.245 14.255 14.255 12.245 14.255 9.755C14.255 7.26501 12.245 5.255 9.755 5.255C7.26501 5.255 5.255 7.26501 5.255 9.755Z">
</path>
</g>
</svg>
</button>
</form>
Text Content
Skip to main content VentureBeat Homepage * Events * GamesBeat * Data Pipeline * The MetaBeat Event * Account Settings * Log Out * Become a Member * Sign In VentureBeat Homepage DataDecisionMakers * * VENTUREBEAT * AR/VR * Big Data * Cloud * Commerce * DataDecisionMakers * Dev * Enterprise * Entrepreneur * Marketing * Media * Mobile * Security * Social * Transportation FOLLOW follow us on Twitter follow us on Facebook follow us on LinkedIn Follow us on RSS THE MACHINE * AI * Machine Learning * Computer Vision * Natural Language Processing * Robotic Process Automation FOLLOW Follow us on RSS GAMESBEAT * Games * Esports * PC Gaming FOLLOW follow us on Twitter Follow us on RSS EVENTS * Upcoming * Media Partner * Webinars GENERAL * Briefings * Got a news tip? * Advertise * Press Releases * Guest Posts * Contribute to DataDecisionMakers * Deals * Data Pipeline * Jobs * VB Lab * About * Contact * Privacy Policy × JOIN THE VENTUREBEAT COMMUNITY FREE: JOIN THE VENTUREBEAT COMMUNITY FOR ACCESS TO 3 PREMIUM POSTS AND UNLIMITED VIDEOS PER MONTH. Learn More SIGN UP WITH YOUR BUSINESS E-MAIL TO CONTINUE WITH TICKET PURCHASE Please wait... SHARE * Share on Facebook * Share on Twitter * Share on LinkedIn * VentureBeat Homepage * Social Links * Briefings * Events * Profile Community SURPRISING CYBERSECURITY WEAK POINTS BUSINESS OWNERS SHOULD LOOK OUT FOR Charlie Fletcher@charlie_f365 April 17, 2022 10:10 AM * Share on Facebook * Share on Twitter * Share on LinkedIn Image Credit: weerapatkiatdumrong // Getty Learn how your company can create applications to automate tasks and generate further efficiencies through low-code/no-code tools on November 9 at the virtual Low-Code/No-Code Summit. Register here. -------------------------------------------------------------------------------- Cybersecurity has taken on new levels of importance facing redoubled cyber attacks. The post-pandemic digital landscape is fraught with threats. In fact, these attacks peaked in December of 2021 with a slew of Log4j exploits. The popular Java-based logging utility is only one surprising cybersecurity weak point that business owners should look out for, however. Additionally, flaws in both human cybersecurity measures and protective technology create vulnerabilities for companies. By exploring these weaknesses in-depth, you can create actionable plans to shore up your digital integrity. 1 / 9 Panel Discussion From Data Literacy to Proficiency: A Journey to Weave Data and Learning into Company Culture Read More 854.5K 4 Video Player is loading. Play Video Unmute Duration 0:00 / Current Time 0:00 Playback Speed Settings 1x Loaded: 0% 0:00 Remaining Time -0:00 FullscreenPlayUp Next This is a modal window. Beginning of dialog window. Escape will cancel and close the window. TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaque Font Size50%75%100%125%150%175%200%300%400%Text Edge StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall Caps Reset restore all settings to the default valuesDone Close Modal Dialog End of dialog window. Playback Speed 0.25x 0.5x 1x Normal 1.5x 2x Replay the list * Powered by AnyClip * Privacy Policy TOP ARTICLES Panel Discussion From Data Literacy to Proficiency: A Journey to Weave Data and Learning into Company Culture From increasingly ingenious phishing schemes to breakthroughs in offensive AI, digital threats expose the weakness in our IT frameworks and data systems. Identifying these weaknesses is crucial, as 85% of IT professionals pivot toward passwordless technology. What follows are the cybersecurity vulnerabilities you should address as a business owner. PHISHING, SMISHING, AND HUMAN ERROR Phishing is one of the most nefarious and impactful forms of cyberattack, typically drawing on fraud and social engineering to infiltrate a system. Although business email compromise (BEC) attacks make up a small portion of all cybercrime, the damages can be the most costly. With over $345 million in estimated losses from these attacks, zero-trust email security systems are a must. EVENT Low-Code/No-Code Summit Join today’s leading executives at the Low-Code/No-Code Summit virtually on November 9. Register for your free pass today. Register Here Now, phishing has changed to be more subtle and attackers are able to infiltrate in ways most workers might not expect. “Smishing” or phishing with SMS texts is one example of this. Cybercriminals send out disguised texts with links. When employees open them, they are lured to duplicitous sites where personal information can be obtained or rootkits installed. From here, business accounts are subject to hacking, malware, and theft. IBM found that human error contributes at least partially to 95% of all data breaches. With more convincing phishing schemes targeting businesses, these instances of human error will only increase. For business owners, embracing zero-trust authorization measures alongside comprehensive security training and practices will be key to mitigating this vulnerability. advertisement OUTDATED SOFTWARE After human error, outdated software can be one of your biggest cybersecurity vulnerabilities. Failing to update a system puts you at greater risk of attack because the older a version of unpatched software, the longer attackers have had to determine that version’s vectors and vulnerabilities. Outdated software comes with outdated security credentials. Wherever consumer, financial, or backend data is concerned, the software you use to manage it presents a vulnerability without consistent updates. Take the popular Customer Service Management (CMS) software Drupal 7 and 8, for example. Both these modules are losing (or have already lost) support. Yet, many businesses still rely on them to manage customer data. To mitigate weak points, you need data governance plus up-to-date support. This means switching to Drupal 9 or other headless CMS platforms. This is just one example, however. Every software tool and data-driven platform you use in the course of business should be kept up to date to prevent problems. Even cryptocurrency wallets and payments systems can pose a larger threat if out of date. advertisement CRYPTOCURRENCY INFILTRATION Cryptocurrencies, their wallets, and their payment systems are often recommended for their elevated levels of security. However, crypto tech is subject to risk of cyber threat just like any connected technology — decentralized or not. For exampe, cybercriminals can compromise trading platforms and steal private information. This means that businesses that incorporate cryptocurrency in any form must be aware of its weak points and ideal security practices. Wherever third parties exchange information, there’s a chance a hacker could infiltrate the system. That’s why measures like decentralized digital identity (DDID) solutions are emerging as a means of streamlining data ownership. The user creates their unique identity, which comes with private keys that are checked against the authorization process. Explore the vulnerabilities of any cryptocurrency practices you implement, then strengthen your approach with comprehensive authorization tools. Artificial intelligence is a means to achieve this — but AI can be a double-edged sword. advertisement OFFENSIVE AI The power of AI to transform cyber defense has not yet reached its limitations — if indeed it has any. However, cybercriminals are utilizing the power of AI to go on the offensive as well. Tapping into an AI’s ability to learn and improve through data modeling, hackers are finding new success when it comes to picking at systems to find vulnerabilities. Emotet is one such example of a prototype offensive AI that brute forces its way through passwords, leading to breaches in the worst-case scenario and lost productivity through lockouts and resets in the best case. These smart attacks can impersonate users, hide in the background, and tailor attacks to specific systems. Conflicting endpoints, partial patch management, and disparate legacy systems all increase the opportunity for offensive AI to slip through. However, systems like the Ivanti Neurons platform are also using AI to bridge these security gaps. With AI and deep learning, Ivanti and other security providers are developing systems for IT Service Management (ITSM) that protect data through automated configurations, remediation, and zero-trust control. Though only 8% of businesses have adopted defensive AI like this so far, trends in AI-powered cybersecurity are elevating business protections in meaningful ways. That said, AI on its own is only one layer of the multifaceted defense strategies you should employ. advertisement CATCHING CYBERSECURITY WEAK SPOTS Catching cybersecurity vulnerabilities isn’t easy. It requires an expert awareness of phishing schemes, software status, infiltration points, and offensive tools. These weaknesses threaten the integrity of data systems and can lead to devastating damages for businesses. As a business owner, look out for these threats as you develop a more modern and comprehensive approach to digital security. Charlie Fletcher is a freelance writer covering tech and business. DATADECISIONMAKERS Welcome to the VentureBeat community! DataDecisionMakers is where experts, including the technical people doing data work, can share data-related insights and innovation. If you want to read about cutting-edge ideas and up-to-date information, best practices, and the future of data and data tech, join us at DataDecisionMakers. You might even consider contributing an article of your own! Read More From DataDecisionMakers METABEAT 2022 Join metaverse thought leaders in San Francisco on October 4 to learn how metaverse technology will transform the way all industries communicate and do business. Register Here METABEAT 2022 MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA. Register Now JOIN FORCES WITH VENTUREBEAT AT OUR UPCOMING AI & DATA EVENTS Sponsor VB Events * DataDecisionMakers * Follow us on Facebook * Follow us on Twitter * Follow us on LinkedIn * Follow us on RSS * VB Lab * Briefings * Events * Special Issue * Product Comparisons * Jobs * About * Contact * Careers * Privacy Policy * Terms of Service * Do Not Sell My Personal Information © 2022 VentureBeat. All rights reserved. × We may collect cookies and other personal information from your interaction with our website. For more information on the categories of personal information we collect and the purposes we use them for, please view our Notice at Collection.