Top

Category: Editorial


Editorial

What Is OS Fingerprinting and How to Prevent This Threat

November 7, 2022

Via: Natalie Dunn

The growing number of Internet users brings with it a proportional increase in cyberattacks. And as the number of attacks increases, organizations and individuals alike should prepare and protect their vital information. Operating System (OS) Fingerprinting could pose a major […]


Editorial

Cyber Crisis Simulation: Preparing Your Organization to Respond to Real Cyberattacks

November 2, 2022

Via: Natalie Dunn

Organizations, whether in the public or private sector, should consider implementing security strategies that ensure the long-term resilience of their critical processes against targeted or opportunistic cyberattacks. However, ensuring a perfect defense is a difficult goal to achieve because it […]


Editorial

A Guide to Developing a Successful Cybersecurity Strategy for Your Business

October 24, 2022

Via: Isabella Carter

In today’s fast-paced world, protecting your organization from security threats and cyberattacks is more challenging than ever. Business and technological advancements are creating new pathways of opportunity, but unprecedented cybersecurity concerns are also emerging and attackers are ready to exploit […]


Editorial

Quantum Menace: Looking at Quantum Computing Through a Cybersecurity Lens

October 11, 2022

Via: Natalie Dunn

The age of quantum computing has arrived, and it’s not just another “next step” in computing. Quantum computing will bring about what may prove to be the most significant change yet in cybersecurity. Big tech companies are developing quantum computers […]


Editorial

5 Strategies for Balancing Security, Acquisition, and Support Costs Without Sacrificing CX

October 11, 2022

Via: Joseph Saunders

Since its inception, the global pandemic has continued to have a long-lasting impact on how we buy, work, and also how our businesses operate.  As such, user behaviour has naturally evolved, leading to developments in customer experience (CX) to meet […]


Editorial

U2F Security Key Explained: How It Works & Why You Need It

September 20, 2022

Via: Natalie Dunn

As we are increasingly vulnerable to online crime, a strong password used for a website is no longer considered a sufficient security measure, especially for those handling sensitive data. Even if we use special characters and upper and lower case […]


Editorial

The Secure USB Stick—The Little Wizard of Strong Security Practices

September 19, 2022

Via: Natalie Dunn

Nowadays, implementing strong security practices is more important than ever because offices are no longer stable physical locations, while the diversity of access points in organizations’ ecosystems are constantly growing. Managers are facing these challenges for the first time, and […]


Editorial

Social Engineering—From the Trojan Horse to Friendly Emails: Exploiting the Most Common Human Characteristics

August 31, 2022

Via: Natalie Dunn

Organizations view information as a strategic resource, and the importance of integrating applications and IT systems are becoming increasingly important. So, in recent years—as a result of accelerated digitization—the list of risks and types of cyberattacks has grown. Furthermore, emails […]


Editorial

Understanding Homomorphic Encryption: A Crucial Technology for Securing Data in Cloud Computing

August 15, 2022

Via: Natalie Dunn

A few years ago, talking about homomorphic encryption in a business context would elicit either blank stares or sighs. Those who were familiar with it recognized its paradigm-shifting potential, and others were just curious about its potential and its computational […]


Editorial

Are We Still Using Firewalls In 2022?

July 29, 2022

Via: Natalie Dunn

Designed to protect computer networks against unauthorized access, firewalls have been an enterprise battleground for many years. The firewall may be implemented as a form of hardware, software, or a combination of the two. After the “classic” firewall market became […]


Editorial

Backup: An Essential Process in the New Global Business Environment

July 19, 2022

Via: Natalie Dunn

The pandemic has forever changed the way we work, with many organizations resorting to remote working whether they liked it or not. Many businesses underestimated the risks associated with remote working and cloud solutions, with some managers believing they simply […]


Editorial

Cybersecurity: A Key Priority in the Current Geopolitical Context

June 27, 2022

Via: Natalie Dunn

Governments and companies around the world are concerned about the growing risks of cyberattacks against their critical infrastructure. The pandemic and the current crisis in Ukraine have intensified cyberattacks as criminals continue to direct their efforts toward leveraging increasingly sophisticated […]


Editorial

Top 10 Pentesting Tools Used by Security Professionals and Ethical Hackers

June 14, 2022

Via: Natalie Dunn

With cyberattacks on the rise, it’s more vital than ever for organizations to be able to test the strength of their systems. A penetration test or “pentest” is an efficient process when it comes to identifying and exploiting vulnerabilities within […]


Editorial

Pro-Russian Hacker Groups Are Targeting Ukraine and Its Allies: DDoS Attacks Are at an All-Time High in Q1 2022

May 20, 2022

Via: Natalie Dunn

Cybercriminals are continuing to exploit the ongoing crisis in Ukraine. After initial report of increased malicious and scam activity, the Russian invasion in Ukraine led to the largest-ever spike in DDoS attacks. Compared to the first quarter of 2021, the […]


Editorial

Understanding the First Vulnerability Discovered in Apple Silicon and Mobile Chips

May 16, 2022

Via: Natalie Dunn

Researchers at three universities have unearthed a vulnerability in Apple Silicon used in Macs, iPhones, and iPads. While any vulnerability is a cause for alarm, the researchers state that the risk is “not that bad”. The weakness has been dubbed […]


Editorial

3 Reasons Why Cloud Contact Centres Are the Next Step in Customer Success

April 25, 2022

Via: Nakisani Jacobs

At the same time that the implications of the global pandemic have created difficulties for many, they have also sparked an opportunity for growth and change.  One key area that has continued to evolve even as we return to a […]


Editorial

Why Your Business Needs A VPN

April 20, 2022

Via: Nakisani Jacobs

Today’s businesses, regardless of size, are vulnerable to hacking and data theft, which can result in significant financial loss. A virtual private network (VPN) uses advanced technology to protect your business data and keep you safe from online threats. A […]


Editorial

Creating the Perfect Password: Simple Tricks that Makes it Almost Impossible to Break

April 20, 2022

Via: Natalie Dunn

Creating the perfect password is not a complicated endeavor, and it is crucial for business and personal safety. Passwords like 123456, “password” and “qwerty” are common, and should be avoided. Even more complicated passwords can be easily cracked if a […]


Editorial

Protecting Your System Against Ransomware-as-a-Service Attacks

April 8, 2022

Via: Natalie Dunn

Ransomware-as-a-Service (RaaS) is a relatively new acronym in IT terminology. Derived from the more common SaaS, PaaS or IaaS, RaaS defines a service that is not only available to ordinary users, but also to cybercriminals. Regardless of the business or […]


Editorial

Understanding Risk-Based Authentication: Main Benefits and Drawbacks

March 31, 2022

Via: Natalie Dunn

Now more than ever, companies have digital assets to protect and more users who need to access them from different places. Credential-based threats make it difficult to secure these valuable resources while making them easily accessible to those who legitimately […]