numbers and data for cybersecurity
iStockphoto

THE INSTITUTE During the past year, the COVID-19 pandemic has prompted many organizations to transition from office work to working from home. The initial shift created an increase in cyberattacks, though, as cybercriminals tried to exploit weak network security.

A recent attack on Colonial Pipeline, for example, disrupted the company's gasoline supplies. The pipeline's operator paid US $4.4 million in Bitcoin to get its data back, according to news reports.

With workers beginning to return to the office either full time or on a hybrid work schedule, companies could be more at risk of cyberattacks. In a recent Tessian survey, 56 percent of IT leaders said employees established bad cybersecurity habits while working remotely. The survey also found that leaders are increasingly worried about ransomware attacks. Many organizations and government agencies are reassessing their cybersecurity protocols.

Ekram Ahmed, spokesman for cybersecurity company Check Point Software Technologies, told Vox, “We're seeing a staggering 102 percent overall increase in the number of organizations affected by ransomware this year, compared to the beginning of 2020."

PROTECTING YOUR DATA

“Cybersecurity training should be a part of the onboarding process for all new employees," IT Governance says, “and include examples of security incidents and the details of colleagues to contact if they think they have fallen victim" to an attack. Organizations also should conduct regular simulated phishing attacks to ensure employee awareness, experts say.

IEEE Educational Activities has partnered with ISACA, an international professional association focused on IT governance, to offer the ISACA Cybersecurity Nexus (CSX) training platform to organizations as a partner solution that complements IEEE's research, standards, and education programs.

The CSX program provides real-world cybersecurity training to help professionals identify and mitigate potential cyberattacks through hands-on, performance-based courses in a live network environment. The on-demand program is presented in a self-paced format.

The CSX platform includes:

  • Instructional courses and labs in a sandbox environment that safely replicates the world practitioners work in every day. The courses enable technical teams to build, practice, and test their skills in a live environment.
  • Technical skill-set training, from beginner to advanced.
  • A dashboard to review team performance, with real-time progress-tracking.
  • More than 300continuing professional education credit hours that can be applied toward earning the CSX cybersecurity practitioner certification as well as similar credentials.

Learn how you can help your IT professionals and other employees build critical cybersecurity skills with the CSX platform.

A CSX on-demand session offers an understanding of current cybersecurity trends and can help you determine the level of cyberthreats to your organization.

MORE RESOURCES

IEEE Educational Activities is also hosting the virtual event, Cybersecurity Considerations for an Effective Cyber Strategy Within Your Workforce, on 28 October. The presenters are CSX's senior director of emerging technologies and innovation Dustin Brewer and BlueVoyant's senior director of proactive services Frank Downs. This event, featuring a live Q&A, will provide an understanding of the current cybersecurity trends that will help you determine the level of cyber threats to your organization. It will be available on-demand after the live event concludes.

Johanna Perez is a digital marketing specialist for IEEE Educational Activities.

This article was updated from an earlier version.

The Conversation (0)

Get unlimited IEEE Spectrum access

Become an IEEE member and get exclusive access to more stories and resources, including our vast article archive and full PDF downloads
Get access to unlimited IEEE Spectrum content
Network with other technology professionals
Establish a professional profile
Create a group to share and collaborate on projects
Discover IEEE events and activities
Join and participate in discussions

3D-Stacked CMOS Takes Moore’s Law to New Heights

When transistors can’t get any smaller, the only direction is up

10 min read
An image of stacked squares with yellow flat bars through them.
Emily Cooper
Green

Perhaps the most far-reaching technological achievement over the last 50 years has been the steady march toward ever smaller transistors, fitting them more tightly together, and reducing their power consumption. And yet, ever since the two of us started our careers at Intel more than 20 years ago, we’ve been hearing the alarms that the descent into the infinitesimal was about to end. Yet year after year, brilliant new innovations continue to propel the semiconductor industry further.

Along this journey, we engineers had to change the transistor’s architecture as we continued to scale down area and power consumption while boosting performance. The “planar” transistor designs that took us through the last half of the 20th century gave way to 3D fin-shaped devices by the first half of the 2010s. Now, these too have an end date in sight, with a new gate-all-around (GAA) structure rolling into production soon. But we have to look even further ahead because our ability to scale down even this new transistor architecture, which we call RibbonFET, has its limits.

Keep Reading ↓Show less
{"imageShortcodeIds":[]}