Advertisement
Top

Category: Editorial


Editorial

Social Engineering—From the Trojan Horse to Friendly Emails: Exploiting the Most Common Human Characteristics

August 31, 2022

Via: Natalie Dunn

Organizations view information as a strategic resource, and the importance of integrating applications and IT systems are becoming increasingly important. So, in recent years—as a result of accelerated digitization—the list of risks and types of cyberattacks has grown. Furthermore, emails […]


Editorial

Understanding Homomorphic Encryption: A Crucial Technology for Securing Data in Cloud Computing

August 15, 2022

Via: Natalie Dunn

A few years ago, talking about homomorphic encryption in a business context would elicit either blank stares or sighs. Those who were familiar with it recognized its paradigm-shifting potential, and others were just curious about its potential and its computational […]


Editorial

Are We Still Using Firewalls In 2022?

July 29, 2022

Via: Natalie Dunn

Designed to protect computer networks against unauthorized access, firewalls have been an enterprise battleground for many years. The firewall may be implemented as a form of hardware, software, or a combination of the two. After the “classic” firewall market became […]


Editorial

Backup: An Essential Process in the New Global Business Environment

July 19, 2022

Via: Natalie Dunn

The pandemic has forever changed the way we work, with many organizations resorting to remote working whether they liked it or not. Many businesses underestimated the risks associated with remote working and cloud solutions, with some managers believing they simply […]


Editorial

Cybersecurity: A Key Priority in the Current Geopolitical Context

June 27, 2022

Via: Natalie Dunn

Governments and companies around the world are concerned about the growing risks of cyberattacks against their critical infrastructure. The pandemic and the current crisis in Ukraine have intensified cyberattacks as criminals continue to direct their efforts toward leveraging increasingly sophisticated […]


Editorial

Top 10 Pentesting Tools Used by Security Professionals and Ethical Hackers

June 14, 2022

Via: Natalie Dunn

With cyberattacks on the rise, it’s more vital than ever for organizations to be able to test the strength of their systems. A penetration test or “pentest” is an efficient process when it comes to identifying and exploiting vulnerabilities within […]


Editorial

Pro-Russian Hacker Groups Are Targeting Ukraine and Its Allies: DDoS Attacks Are at an All-Time High in Q1 2022

May 20, 2022

Via: Natalie Dunn

Cybercriminals are continuing to exploit the ongoing crisis in Ukraine. After initial report of increased malicious and scam activity, the Russian invasion in Ukraine led to the largest-ever spike in DDoS attacks. Compared to the first quarter of 2021, the […]


Editorial

Understanding the First Vulnerability Discovered in Apple Silicon and Mobile Chips

May 16, 2022

Via: Natalie Dunn

Researchers at three universities have unearthed a vulnerability in Apple Silicon used in Macs, iPhones, and iPads. While any vulnerability is a cause for alarm, the researchers state that the risk is “not that bad”. The weakness has been dubbed […]


Editorial

3 Reasons Why Cloud Contact Centres Are the Next Step in Customer Success

April 25, 2022

Via: Nakisani Jacobs

At the same time that the implications of the global pandemic have created difficulties for many, they have also sparked an opportunity for growth and change.  One key area that has continued to evolve even as we return to a […]


Editorial

Why Your Business Needs A VPN

April 20, 2022

Via: Nakisani Jacobs

Today’s businesses, regardless of size, are vulnerable to hacking and data theft, which can result in significant financial loss. A virtual private network (VPN) uses advanced technology to protect your business data and keep you safe from online threats. A […]


Editorial

Creating the Perfect Password: Simple Tricks that Makes it Almost Impossible to Break

April 20, 2022

Via: Natalie Dunn

Creating the perfect password is not a complicated endeavor, and it is crucial for business and personal safety. Passwords like 123456, “password” and “qwerty” are common, and should be avoided. Even more complicated passwords can be easily cracked if a […]


Editorial

Protecting Your System Against Ransomware-as-a-Service Attacks

April 8, 2022

Via: Natalie Dunn

Ransomware-as-a-Service (RaaS) is a relatively new acronym in IT terminology. Derived from the more common SaaS, PaaS or IaaS, RaaS defines a service that is not only available to ordinary users, but also to cybercriminals. Regardless of the business or […]


Editorial

Understanding Risk-Based Authentication: Main Benefits and Drawbacks

March 31, 2022

Via: Natalie Dunn

Now more than ever, companies have digital assets to protect and more users who need to access them from different places. Credential-based threats make it difficult to secure these valuable resources while making them easily accessible to those who legitimately […]


Editorial

How The Russian Invasion of Ukraine Is Being Exploited By Hackers

March 23, 2022

Via: Natalie Dunn

Cybercriminals, political and other threat actors are trying to exploit the ongoing crisis in Ukraine. Since the start of the Russian invasion in Ukraine, several major software and games developers have fallen victim to cyberattacks. Furthermore, cybersecurity researchers are detecting […]


Editorial

Cybersecurity Tips For Small Businesses In A Post-Pandemic World

February 28, 2022

Via: Natalie Dunn

The year 2021 has been shaped by an economic recovery from the coronavirus pandemic, as people and businesses have modified and adjusted their personal and professional lives to meet new and diverse challenges. As businesses focused on aligning with the […]


Editorial

There is No Security Without Data Protection and No Data Protection Without Security

February 21, 2022

Via: Natalie Dunn

In the last few years, two definitions gave entrepreneurs and business managers headaches: security and data protection. There is no security without data protection and no data protection without security. Here’s why these two definitions should always go together.     Living […]


Editorial

Cybersecurity Challenges in an IoT World

January 26, 2022

Via: Natalie Dunn

The paradigm shift to the Internet of Things (IoT) and the emergence of edge computing have brought in huge potential for various IoT application scenes. While IoT is creating entirely new businesses and revenue streams, it has also created new […]


Editorial

Warning signs your identity has been stolen—and how to protect yourself against identity fraud

December 30, 2021

Via: Natalie Dunn

According to some estimates, cybercrime is a $6 trillion annual industry, which would qualify it as the world’s third-largest economy after the U.S. and China. There is a great deal of money to be made, and cybercriminals are constantly adopting […]


Editorial

Has Ransomware Stolen Christmas?

December 29, 2021

Via: Abby Hallett

According to Forbes, ransomware has cost organizations $102.3 million per month in 2021 and is expected to have cost the US economy $265 billion by 2031. These staggering figures show that ransomware attacks are extremely detrimental to businesses and organizations […]


Editorial

WhatsApp and iMessage Give Large Amounts of User Data to the FBI: Leaked Document

November 30, 2021

Via: Natalie Dunn

Almost all instant messaging services on the market today make a big deal about their security and privacy policies. A recently leaked document has revealed just how much data the FBI can legally obtain from these services. The infographic shows […]