Top Cybersecurity threats to look out for in 2019

  Network outages, hacking, computer viruses and other malware affect our lives in ways that range from inconvenience to the potentially devastating loss of income and/or assets. As the number of mobile users, digital applications and data networks increase, so do the opportunities for exploitation. Cybersecurity is a major concern for all companies and individuals as poor security can lead to costly downtime and critical data loss as well as the invasion and loss of privacy. Here are three of the biggest ... Read more

Massive Marriott Hack

  The hotel heavyweight Marriott announced a massive hack on 30 November 2018 that impacted as many as 500 million customers who made a reservation at a Starwood hotel. This intrusion that caused the enormous data breach predates to the beginning of 2014. Marriott is working with law enforcement and regulators in investigating the hack, with no finalised number of people impacted. Their network included different combinations of names, addresses, phone numbers, email addresses, passport numbers, dates of birth and trip reservation information, all of which was ... Read more

3 Ways to Help Keep IT Systems Secure 

Technology continues to present new opportunities for business owners. Increased mobility and productivity offered by these platforms are just some of the advantages of moving business online. As useful as all these modern inventions are though, they also present growing security concerns.   Online security is a common concern shared among the cyber community and one should prioritise protecting one’s own online footprint. The culture of changing passwords regularly, updating system software and avoiding unknown attachments have been etched into the operation of ... Read more

Be prepared with incident management for your business

  Breaches happen, but most companies are not prepared. An incident is an unexpected disruption to a service. It disturbs the normal operation thus affecting end user’s productivity. An Incident may be caused due to an asset that is not functioning properly or network failure. Incident management is a term describing the activities of an organisation to identify, analyse and correct hazards to prevent a future re-occurrence in a way that aims to create as little negative impact on the business as ... Read more

How to detect a Targeted Cyber Attack

  A targeted attack is any malicious attack that is targeted at a specific individual, company, system or software. Targeted cyber attacks are considered higher risk with higher rewards for attackers than the average random attack. Attackers’ main motivations are usually always financial, with the goal to steal information and extort money from the victims. All organisations should Your company should be ready for a targeted cyber attack and have set processes and protocols in place to best deal with the possibility of this occurring.   Detecting a targeted ... Read more

3 Ways to ensure cyber security hygiene

  Operational Security is a great way to support a cyber security culture in your organisation, allowing employees to feel safer in their working space, but it can also lead to a false sense of invulnerability. People in general aren’t worried about cyber security, most being entirely too complacent about this mostly misunderstood and underestimated aspect of network safety. Everyone, in fact, needs basic pointers on security hygiene. Here are three of the best practices to implement if you are wanting to ... Read more

Stop data breaches with managed detection and response

  The online threat landscape has changed drastically. Advanced attacks, spear-phishing and data breaches are, unfortunately, pretty much the norm today. With cyber attacks growing more advanced day by day, you cannot rely on stopping all threats from entering your network. The faster you can identify and contain suspicious activity, the smaller the damage to your business. Managed detection and response (MDR) is an innovative solution to this crisis and these services are filling the needs of organisations of all sizes that ... Read more

Shut Down, Sleep or Hibernate – how vulnerable is your computer in these stages?

  Computers can sleep, hibernate or shut down. Some people leave their computers running 24/7, while others shut down their computers the moment they step away. Laptops in particular require you to be power conscious about your habits—especially when running on the battery. Here are some differences between sleep, hibernate and shut down that will help you decide what’s right for your computer.   Shut Down: A computer that is shut down uses virtually no power of course, but you have to go through the ... Read more

Vulnerability Management 101

  Managing vulnerabilities in a company network is an endless task that is compounded by the limited manpower that many companies experience as a result of the cyber security skills shortage. It’s almost impossible to fix every single vulnerability there is, but these tips will help keep the more susceptible vulnerabilities at bay:   Regular updates Make sure that your workstation and server software is up-to-date at all times. Malware thrives on exploiting vulnerabilities that have not been picked up yet. Patching all outdated software ... Read more

What you need to know about the worst Facebook hack to date

  On 16 September 2018, engineers at Facebook detected some unusual activity on the social media platform's networks. It was an attack, the biggest security breach in Facebook's history, and it took the company eleven more days to stop it. The attackers figured out how to exploit three separate vulnerabilities in Facebook's code. The breach affected 50 million accounts and took advantage of ‘tokens’ - a system used by third-party platforms such as Spotify. This exploit actually existed since July 2017 and no-one seems ... Read more
Next Page »