What should a company mark down as ‘done’ when it comes to a strong cyber-defense internal policy that also depends of its employees, besides using the right software tools? Cyber awareness policies, obviously. We have previously approached the recommended organizational cyber-strategies when it
In-depth cyber defense sees the process of stopping attacks as being only half of the protection activity. Going to the roots of the incident or of the event and thus preparing the system in order to fend off future similar situations is the subsidiary defense move that completes any cyber-shield.
Lately many cyber-security online sources warned enterprises of the business email compromise scheme (also known as the BEC scam), and they do this for a good reason: this fraud method has spiked over the last few months. BEC attacks are a particular type of spear phishing, and four organizations
Fingerprint scanners have had primitive aspects throughout history. The use of fingerprints (or more exactly handprints) in authentication dates back to 1858. Sir William Herschel, Chief Magistrate, introduced the identification via handprint for his civil service employees in India. It took about
One of early 2016’s cyber-security incidents consisted in the Hyatt hotel chain disclosure that almost half of its global payment processing systems endpoints have been infested with PoS malware, active for 6 months during 2015. A Kasperky Lab blog pointed out, the situation is not singular and
SCADA stands for Supervisory Control and Data Acquisition, being the consecrated denomination since the 70s for the remote monitoring and control activities necessary in modern industrial activities. A subcategory of the general ICS (Industrial Control Systems), SCADA systems gained importance with
All good passwords have to meet a double condition: hard to guess, yet unforgettable in what their owner is concerned. Even more, how do you achieve that? Obviously, many password users fail at choosing the best virtual key for their accounts. Yet another password secret relies in seeing the
Acting as a cyber-security defense line, user behavior analytics (UBA) consist of monitoring the human behavior patterns that emerge from interacting with an IT system, establishing the normal zone and identifying any anomalies that could signal vulnerabilities or threats. This behavior-focused
Wireless or radio frequency wireless jamming designates the intentional activity of disrupting radio signals in order to disable any transmission that uses radio waves to circulate data or commands to and from RF devices. When used for malicious purposes, this wireless jamming is actually a DDoS
On June 15, 2015 the Consumer Watchdog group from Santa Monica, CA addressed a petition to the FCC regarding the way “edge” providers honor the “do not track request”. By “edge providers” the group has in mind entities such as Google, Facebook, YouTube, Pandora, Netflix, or LinkedIn. The “do not
ITCurated uses cookies to personalize your experience on our website. By continuing to use this site, you agree to our Cookie Policy