The smart devices we use at home or at the office don’t always work as expected, and we often find that our gadgets don’t quite protect our personal data, such as addresses, passwords, and search/browsing history. One such example would be the Amazon Echo smart speaker. A recently published study de
Background In May 2017, 230 thousand computers were infected by a ransomware cryptoworm, called WannaCry—leading to roughly $100 million in damages, according to Infosecurity Magazine . The first of these attacks were first recorded in Europe at 3:24 am EDT, as reported by Norton Rose Fulbright. A
As much of the global workforce rapidly transitioned to the remote work model, cybersecurity professionals faced an onslaught of new challenges—from securing remote devices to educating users on best practices for security outside the traditional office. But other factors were and still are also at
Data Privacy is an area of data protection that deals with the proper handling of information, focusing on compliance with data protection regulations. How data should be collected, stored, managed, and shared with any third parties—are the main concerns of data privacy. These concerns encompass t
When it comes to website security, you can’t compromise. The COVID-19 pandemic has brought with it a 600% raise in cybercrime compared to the previous year. These cyber attacks consisted of sophisticated phishing emails that took advantage of worldwide network security vulnerabilities. In this n
Assessing which rules and regulations apply to an organization is never an easy endeavor. More often than not, companies need to comply with multiple regulations, many of which have overlapping stipulations. Understanding compliance regulations and the acceptable requirements for developing a