Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Security

3 Steps to better cybersecurity in touchless business solutions (part 1 of 3)

The current pandemic that has upended our lives and wreaked havoc across the world have also humbled countries to a shocking degree. As borders closed, so did major sectors, industries, and businesses. Brick-and-mortar establishments had to cease operations and resume their business remotely to comply with quarantine measures. As conditions are getting better, the next challenge is for governments to restore both lives and livelihoods.

Beyond Passing the Test: Lessons from My Infosec Certification Journey

Not everything that tastes good is healthy, and not everything healthy tastes good. I think of exams as the latter. They are one way to test knowledge, and that attitude is a big part of how I survived getting certified. After taking all kinds of exams, one thing hasn’t changed – I don’t like them. I get anxious when faced with tests. I dislike the all-or-nothing of each question.

How Can You Prevent Spyware and Adware?

Businesses remain under a constant threat of being attacked by malware through a variety of different attack vectors. Malware is an abbreviation used for malicious software. Malware has been one of the most prominent threats since the very beginning of the origin of the internet and still pertains to be so. Malware is an umbrella term, and it includes virus, trojan horse, ransomware, worm, spyware, adware, etc. In this article, we will be focussing on spyware and adware.

Top 5 Data Breaches in 2020, So Far

In 2020, the chances of falling victim to data breaches are increasing. Keeping customers in the loop can be costly, time-consuming but very necessary and important to help prevent loss of personal data and decrease the risk of fraud. Cyber-attacks and data breaches can rarely be kept quiet and if the incident occurs at a high profile organisation, it’s only a matter of time before it makes the news.

Prevent and Detect Threats Across Multi-Cloud Environments

The cloud has become ubiquitous in all we do, and the line between the perimeter and the cloud continues to shrink as most enterprise organizations are looking to shift their cloud strategy to a multi-cloud approach. Moving to the cloud comes with plenty of benefits like performance optimization, improved reliability and overall cost savings, but cloud adoption is not without its risks and challenges.

SMEs and the cyber security challenge

EasyJet, CapitalOne, British Airways and Marriott are all huge companies with equally large budgets. Another thing they have in common is they all fell victim to a serious data breach, costing them hundreds of millions of pounds. If the major players with a lot of resources to devote to cyber security still get hacked, do SMEs with limited budgets stand a chance? It’s a dramatic question, so let’s explore the answer.

The value of a stolen account. A look at credential stuffing attacks.

A type of credential reuse attack known as credential stuffing has been recently observed in higher numbers towards industry verticals. Credential stuffing is the process of automated probing of and access to online services using credentials usually coming from data breaches, or bought in the criminal underground.

Types of Wireless Network Attacks

Wireless networks have become an integral part of how we conduct our businesses. They ease many processes and help us get rid of the clutter caused by hundreds of wires yet keeping wireless networks safe poses some challenges. Wireless technologies offer convenient solutions to our needs. They are practical and fast, moreover they set us free of the clutter caused by wires and cables. On the other hand, it is no secret that wireless networks are more vulnerable to attacks and intruders.

How Can You Detect an Insider Threat?

Data security is a term we’re all pretty used to hearing by now, but cybercriminals are only one part of the equation. Did you know that internal employees can also pose a threat to your business? Insider threats are caused by internal staff, employees, or partners who either wish to cause the company harm - or who simply compromise your organization’s data security through carelessness or lack of training.