We subscribe to The Hacker News Newsletter and recommend you do the same to keep abreast of news about cyber threats to your organisation.

From time to time The Hacker News includes useful concise guides which address how to reduce the risk of succumbing to cyber attacks.

This week they published an article entitled "How one bad password ended a 158 year old business".

Its focus: how to build a more resilient defence against ransomware attacks.

Read more: How one bad password ended a 158 year old business

Building resilient defenses

"If the destruction of a 158-year-old company by a single guessed password gives you an awful feeling in the pit of your stomach, it should: cybersecurity failures have real-world consequences."

The Hacker News article recommends four steps to reduce the risk of falling victim to ransomware attacks.

  • Implement strong password policies,
  • Enable multi-factor authentication,
  • Implement zero-trust architecture and least privilege access control, and
  • Perform regular backup testing and recovery.

Below we identify how the Joomla! CMS enables you to address each of the above steps.

More about WYNCHCO Solutions

We subscribe to The Hacker News Newsletter and recommend you do the same to keep abreast of news about cyber threats to your organisation.

From time to time The Hacker News includes useful concise guides which address how to reduce the risk of succumbing to cyber attacks.

This week they published an article entitled "How one bad password ended a 158 year old business".

Its focus: how to build a more resilient defence against ransomware attacks.

Read more: How one bad password ended a 158 year old business

Building resilient defenses

"If the destruction of a 158-year-old company by a single guessed password gives you an awful feeling in the pit of your stomach, it should: cybersecurity failures have real-world consequences."

The Hacker News article recommends four steps to reduce the risk of falling victim to ransomware attacks.

  • Implement strong password policies,
  • Enable multi-factor authentication,
  • Implement zero-trust architecture and least privilege access control, and
  • Perform regular backup testing and recovery.

Below we identify how the Joomla! CMS enables you to address each of the above steps.

More about WYNCHCO Solutions

By browsing our website you agree to its use of cookies. Cookie Policy.