As the COVID-19 pandemic forces many employees to work from home, can your organization stay productive – and safe? The coronavirus (COVID-19) outbreak has officially been categorized by the World Health Organization (WHO) as a pandemic, meaning infection is accelerating in multiple countries concurrently. The United States of America has declared travel bans on 28 … More COVID‑19 and the forced workplace exodus
In ongoing consultations with clients, large companies named targeted attacks and hacking as two of their biggest security challenges since they can seriously impact the continuity of business activities in an organization. Attackers have many means to infiltrate companies. However, many attacks, don’t require a very high level of technological sophistication. Instead, techniques like targeted social … More Hacking and targeted cyber-attacks as a result of anti-competitive practices in business
ESET researchers discover a previously unreported cyberespionage platform used in targeted attacks against diplomatic missions and governmental institutions, and privacy-concerned users. ESET researchers have discovered a new espionage platform with a complex architecture, a host of measures to make detection and analysis more difficult and two notable features. First, its GSM plugin uses the AT … More ESET discovers Attor, a spy platform with curious GSM fingerprinting
If you have had tech connectivity issues you may have heard the IT security team say, “that’s a firewall issue”, so what is a firewall and how does it work? As its name would suggest, the term originates from a structure that prevents the spread of a fire, such as emergency fire exits. In old … More Why do IT Security experts refer to firewalls?
A reflection on whether this approach to addressing IoT security challenges can ‘deliver the goods’ and how consumer awareness can help. According to an article by the BBC, the United Kingdom’s Digital Minister Margot James is proposing legislation to introduce a new labelling system to show customers how secure an IoT product is. In order to … More The UK plans to legislate to secure IoT, but is it really the answer?
Streaming media feature among services that take the spotlight in a report on credential-stuffing attacks in 2018. Hackers made 30 billion attempts last year that involved testing out purloined or leaked login details en masse in a bid to invade other people’s online accounts, reads a report by content delivery network provider Akamai. In automated attacks called … More Credential-stuffing attacks behind 30 billion login attempts in 2018
How can smaller businesses address their cybersecurity risks without the resources of large organizations? There are a lot of challenges to being a small-business owner, including safely managing technology. Every risk can have an outsized effect on your ability to stay in business. And resources for protecting your business are often geared towards much larger … More Cybersecurity resources for smaller businesses