November 30, 2021
Via: Natalie DunnAlmost all instant messaging services on the market today make a big deal about their security and privacy policies. A recently leaked document has revealed just how much data the FBI can legally obtain from these services. The infographic shows […]
November 30, 2021
Via: Barbara NelsonOver the last couple of years, there has been a significant increase in the number of ransomware attacks impacting organizations of all industries and sizes. To define ransomware, it is a type of malware that ‘employs encryption to hold a […]
October 29, 2021
Via: Natalie DunnThe recent increase in ransomware attacks has highlighted vulnerabilities in critical infrastructure and the ease of affecting component systems. As the paradigm shifts, important preemptive measures must be taken. A New Generation of Critical Infrastructure A decade ago, critical infrastructure […]
October 28, 2021
Via: Natalie DunnCloud computing’s mobility and ease of access makes it one of the most convenient choices for any modern organization. While using the cloud, though, companies are becoming more and more susceptible to security threats. Most Companies Don’t Protect Their Sensitive […]
September 30, 2021
Via: Natalie DunnHackers have managed to compromise corporate networks three times faster in 2021, with 75% of attacks being financially motivated, a recent report shows. Both government and industry experts say greater complexity and interdependence among systems gives attackers more opportunities for […]
September 28, 2021
Via: Natalie DunnUntil now, ransomware cyberattacks used to follow a simple pattern: infection, encryption, ransom payment. In recent years, access to such malware has become very easy, the idea of accessing a program as a service being more common, marketed on dedicated […]
August 31, 2021
Via: Natalie DunnIsrael had seven cybersecurity unicorns in the first half of 2021, and one in three of the world’s unicorns in the field is Israeli. This is the result of ten years of efforts that started with the drafting of a […]
August 30, 2021
Via: Natalie DunnIn its many years of being the leading app for fast and simple online chat, WhatsApp has been through a lot, including a privacy policy that has sparked some concern. The Facebook-owned platform boasts end-to-end encrypted messaging that provides users […]
July 30, 2021
Via: Natalie DunnThe smart devices we use at home or at the office don’t always work as expected, and we often find that our gadgets don’t quite protect our personal data, such as addresses, passwords, and search/browsing history. One such example would […]
July 8, 2021
Via: John MathewsBackground In May 2017, 230 thousand computers were infected by a ransomware cryptoworm, called WannaCry—leading to roughly $100 million in damages, according to Infosecurity Magazine. The first of these attacks were first recorded in Europe at 3:24 am EDT, as […]
June 22, 2021
Via: John MathewsAs much of the global workforce rapidly transitioned to the remote work model, cybersecurity professionals faced an onslaught of new challenges—from securing remote devices to educating users on best practices for security outside the traditional office. But other factors were […]
June 10, 2021
Via: Diana Beverly RossData Privacy is an area of data protection that deals with the proper handling of information, focusing on compliance with data protection regulations. How data should be collected, stored, managed, and shared with any third parties—are the main concerns of […]
May 28, 2021
Via: Rachel OldfordWhen it comes to website security, you can’t compromise. The COVID-19 pandemic has brought with it a 600% raise in cybercrime compared to the previous year. These cyber attacks consisted of sophisticated phishing emails that took advantage of worldwide network […]
May 21, 2021
Via: Natalie DunnAssessing which rules and regulations apply to an organization is never an easy endeavor. More often than not, companies need to comply with multiple regulations, many of which have overlapping stipulations. Understanding compliance regulations and the acceptable requirements for developing […]
April 30, 2021
Via: Natalie DunnWith cybercrime on the rise, thousands of cyber attacks and data breaches are recorded each day. The phenomenon is surely not showing any signs of slowing down, with several big cyber attacks making the headlines so far this year. In […]
April 19, 2021
Via: Diana Beverly Ross“The shift to remote learning opens the door for different points of attack that most school districts weren’t set up to support” – Amy McLaughlin It was not so long ago that online education became the new norm. Schools and […]
March 29, 2021
Via: Rachel OldfordOn average, 30 000 websites are hacked every day. Since a website is the main way you present your brand, build your online presence, and interact with your digital audience, you don’t want to leave security matters to chance. In […]
March 17, 2021
Via: Diana Beverly RossRisk management includes identifying, analyzing, and responding to risk factors in the life of a business—and effective risk management is done proactively. But what does it mean to have the right risk management and a structure that can predict uncertainties, […]
February 26, 2021
Via: Rachel OldfordSoftware security is dealing with new challenges since the shift to remote work has happened. IT security professionals must evolve and adapt in order to keep up with the requirements of cloud computing and IoT technologies. In a remote environment […]
February 26, 2021
Via: Diana Beverly RossAsking employees to work remotely is no longer news for organizations and governments, in order to protect people’s health. Today, there are more than 300 million people expected to work remotely, according to the US Bureau of Labor Statistics and […]