
![]() ![]() ![]() ![]() |
You have a lot going on, so join the thousands of other leaders and let me do the work and provide you with curated cybersecurity content. It would be my honor to do so.

NOTES: If you want to ensure you get this newsletter every week, please add my "from" address to your contact list. If you would like to Unsubscribe scroll to the bottom and select "unsubscribe". Thank you.
In this week's edition:
- Cyber Bits & Bytes
- Early Warning - Study - The increasing number of endpoint security tools overwhelms users and leaves devices vulnerable.
- Featured Article - 5 Top Benefits of Threat Intelligence in 2023
- Cyber Quote - Rusty Kennington, CIO at Henry Corp.
- Free Cybersecurity Resources - eBooks, tools, apps & services
- Trending Story - Foreign states already using ChatGPT maliciously
- Cybersecurity News Highlights
- Cyber Scam of the Week - Clone Phishing Scams
- Social Posts of the Week

Cyber Bits & Bytes
Why large U.S. universities are blocking TikTok right now - Read more in this CyberTalk.org article
Here are several trends for public sector in 2023 in this article from Federal news Network by Sean Frazier titled:"Public Sector Technology Trends in 2023: Less on Zero Trust and More on CX.
ALERT: CISA Releases ESXiArgs Ransomware Recovery Script for victims, from the Cybersecurity & Infrastucture Security Agency
5 mysterious new malware that could burn your business is the title of a really good read on CyberTalk.org. In the article it points five new mysterious kinds of malware that are affecting organizations.
Early Warning
Study - The increasing number of endpoint security tools overwhelms users and leaves devices vulnerable.
A new study is validating what I am seeing on the ground with our customers regarding the dangers of IT management and security tools, not only for endpoints, but in general. Too many consoles, too many alerts and too many notifications actually reduce the visibility for many organizations because they do not have the people or time to follow-up on all of them. Even severity prioritization is not going to solve this issue. For many this means turning to a platform solution that consolidates all these activities and helps organize, prioritize and increase visibility dramatically, which has a positive impact on the team and organization's ability to remediate many of these issues before they become an painful incident. This is even more important for endpoint, as it impacts the end-users devices that are used to drive business for the organization. Therefore, it requires a delicate and thoughtful approach and touch.
Here is an article excerpt from a CSO Online article written by JonGold: "Enterprises that use endpoint security and management technologies face a problem of growing marketplace “sprawl,” as new tools proliferate and options multiply, according to a study released today by the Enterprise Services Group.
Between the ongoing influence of remote work and IoT, the number and diversity of devices that have to be managed by endpoint security tools is on the rise. As a consequence, the number of available tools to manage them has also risen.
An ESG survey of 380 security professionals in North America, commissioned by cybersecurity company Syxsense, showed that companies using larger numbers of different tools to manage their endpoints had larger proportions of unmanaged endpoints, compared to those with fewer. Put simply, the complexity of the current-day device environment is leading to worse security, according to the research."
Given the IT and cybersecurity labor shortage it is more important than ever to consider a management and security tools consolidation. Not only will you save on your spend (licensing, training, maintenance, etc...), but it can have a very positive impact on your overall environment and security visibility and improve your team's ability to protect your organization. Sounds like a great project to work on and complete in 2023.
Featured Original Article

5 Top Benefits of Threat Intelligence in 2023
It is concerning to see how many businesses out here are not making use of threat intelligence or threat hunting to ensure they have identified and understand the truly relevant threats they need to plan, protect and be ready to respond too. It is literally the best way to ensure your cybersecurity spend is aligned with your target cybersecurity posture and acceptable risk.
Threat intelligence is a critical component of effective cybersecurity for businesses of all sizes. It involves the collection, analysis, and dissemination of information about potential threats to an organization, with the goal of helping the organization prepare for and defend against those threats.
Let's explore the five top benefits of threat intelligence for businesses.
Proactive defense against potential threats: One of the primary benefits of threat intelligence is the ability to proactively defend against potential threats. By gathering and analyzing information about the tactics, techniques, and procedures (TTPs) of malicious actors, businesses can better understand the types of threats they may face and implement appropriate controls and defenses to protect against those threats. This can include implementing technical controls such as firewall rules and intrusion detection systems, as well as strengthening policies and procedures and educating employees on how to recognize and report potential threats.
Prioritization of resources and efforts: With so many potential threats facing businesses today, it's important to prioritize resources and efforts to ensure that the most pressing issues are addressed first. Threat intelligence can help businesses understand the specific threats facing their organization and allocate resources accordingly, ensuring that valuable time and resources are not wasted on less pressing matters.
Improved incident response: In the event that a business does experience a cyber attack, having access to relevant threat intelligence can significantly improve the organization's incident response efforts. By understanding the TTPs of the attackers, the business can more effectively track and remediate the attack, minimizing the damage and getting back to business as usual as quickly as possible.
Compliance with industry regulations and standards: Many industries have specific regulations and standards in place to ensure that businesses are taking appropriate measures to protect against cyber threats. By leveraging threat intelligence to stay informed about relevant threats and implementing appropriate controls, businesses can meet their compliance obligations and reduce the risk of regulatory fines or legal action.
Enhanced reputation and customer trust: In today's digital age, cyber attacks can have significant consequences for businesses beyond just the technical impacts. Reputation and customer trust can be seriously damaged if a business experiences a significant cyber attack. By leveraging threat intelligence to proactively defend against potential threats, businesses can protect their reputation and build customer trust by demonstrating their commitment to cybersecurity.
In summary
Threat intelligence is a valuable tool for improving cybersecurity in businesses of all sizes and will ensure you security spend is right-sized for your organization. By gathering and analyzing information about potential threats, businesses can proactively defend against those threats, prioritize their resources and efforts, improve incident response, meet compliance obligations, and enhance reputation and customer trust. By leveraging threat intelligence, businesses can better protect themselves and their assets against the ever-evolving landscape of cyber threats.
If you haven't made any investments in threat intelligence or threat hunting, then take action in 2023 and improve your security posture and reduce your risk.
Cyber Quote

Free Resources
-
Web Security Academy - Free, online web security training
Trending Story

Other Bytes



Cyber Scam of the Week
Clone Phishing Scams
Organizations often use email to send important information to their customers. If an organization sends out an email that’s missing information, they may send you a follow-up email. Now, cybercriminals are using a technique called “clone phishing” to imitate these follow-up emails and manipulate you.
To start the scam, cybercriminals hijack an email account from a legitimate organization. They use the hijacked account to find an email that was previously sent to you and clone it. To make the clone email look like a typical follow-up email, the cybercriminals add text that claims the original email was missing an attachment with urgent information. If you download the attachment in the clone email, you won’t receive important details about the original message. Instead, you’ll download malware that allows cybercriminals to steal your sensitive information.
Follow the tips below to stay safe from clone phishing scams:
Don’t trust that an email is legitimate just because it was sent through a trusted email address. Cybercriminals can use stolen email addresses to make their scams more believable.
Watch out for a sense of urgency in messages that you receive. Phishing attacks rely on impulsive actions, so always think before you click.
Never click a link or download an attachment in a message that you aren’t expecting.
This Cyber Scam is provided by our sponsors: Netsync & KnowBe4
Cybersecurity Social
Just a couple interesting social posts
The looming threat of cybersecurity debt in the #publicsector #DataSecurity #Privacy #100DaysOfCode #CloudSecurity #Phishing #Ransomware #Cybersecurity #CyberAttack #DataProtection #DataBreach #Hacked #Infosec #cyberthreats #CISO #Malwarehttps://t.co/7WLyfkEY4j
— TechNative (@TechNative) February 1, 2023
Pic of the Day#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #cybersecuritytips pic.twitter.com/GilAcdmwTi
— Hacking Articles (@hackinarticles) February 1, 2023
Why supply chain security could hold the key to reducing #ransomware risk
— TechNative (@TechNative) February 2, 2023
via @TrendMicro #DataSecurity #Privacy #100DaysOfCode #CloudSecurity #Phishing #Cybersecurity #CyberAttack #DataProtection #DataBreach #Hacked #Infosec #cyberthreats #CISOhttps://t.co/5uDF53CURs
Pic of the Day#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #cybersecuritytips pic.twitter.com/7KDfvvFohB
— Hacking Articles (@hackinarticles) January 31, 2023
Did someone forward this email to you? Awesome! You can sign up here and not miss a week of the Morning Boot curated cybersecurity newsletter from Mark Lynd
You received this email because you signed up on our website, attended one of our events, or made a purchase from us. If you do not wish to receive this newsletter anymore, you can unsubscribe here.