All Cyber Security articles – Page 6
-
Video
Avoiding the Ransomware Rampage – 5 Key Steps to Staying Secure
Hosted by: Timo Weberskirch (Sales Engineer, Quest KACE) Video: Avoiding the Ransomware Rampage – 5…
-
Video
Data Protection and Cyber Security in Flux Across the GCC
Hosted by: Nick O’Connell (Partner, Head of TMT – KSA), Vivienne Artz, (Global Chief Privacy Officer, Refinitiv), Noriswadi Ismail (Managing Director – Technology, Privacy and Cyber Risk Advisory), Ryan Rubin (Senior Managing Director, Ankura) Video: Data Protection and Cyber Security ...
-
Video
Avoiding the Security Dangers with Work From Home (WFH)
As more and more office workers find the new normal to be work from home (WFH) there are challenges and dangers that come into play, with 90+% cyber security attacks beginning with email.
-
Video
Immunity Passports: Problem solved or problem evolved?
With the worldwide Covid-19 pandemic still impacting people and the economy, governments from across the globe are looking at ways to return to life before lockdown.
-
Video
How to Minimise Insider Threats in Cyber Security
Insider threats, whether they are from negligence or those with malicious intent, can pose a significant risk to all organisations. Research from Ponemon Institute reveals that the average cost of insider incidents is almost double the average breach, therefore, companies face a much larger threat from workers than from outside.
-
Video
Stopping Email Data Breaches
People cause data breaches every day. Often, without meaning to and the vast majority while using corporate email accounts.
-
Video
Will COVID-19 have a long lasting and transformative impact on the cybersecurity industry?
A new norm, a new reality, a new way of living has been exacted on most of the globe due to the ongoing pandemic. It has changed the way people live, and in turn the way businesses must operate and navigate these challenging times.
-
Video
Recovering from a Breach: Back up, Recovery, Learnings and Best Practice
Unfortunately, data breaches are on the rise. Not only do they pose a threat to the reputation and finance of organisations large and small, but data loss can wipe out hours of productivity, costing the business even further.
-
Video
Re-defining Cybersecurity Awareness
One of the more immediate implications of the Covid-19 pandemic has been the almost forced adoption of tele-interactions and virtual processes. Irrespective of the pervasiveness of malware attacks, network breaches, and hacktivist activities that make headlines, it is the reality of the human element that is a constant variable in all cybersecurity events.
-
Article
Suspected scam gadget store tops Google Search results
A suspected scam store, featuring hard-to-find gadgets topped Google search results for days. The site titled ‘MyTechDomestic’ accepted payments via direct bank transfers only, despite indicating support for credit cards and PayPal, and falsely claimed to be owned by a UK-registered company.
-
Video
Data Protection and Cyber Security Implications from Working from Home
Video: Data Protection and Cyber Security Implications from Working from Home
-
Article
Zoom reveals improved security with 256-bit GCM encryption
Zoom Video Communications has revealed improved security enhancements with 256-bit GCM encryption.
-
Article
Body temperature cameras fuse security with virus screening technology
Cybersecurity and visuals tech company, Platinum CCTV, has unveiled a new thermoptic cybersecurity camera designed to help screen individuals before they enter a facility, to guard against cyber threats and the spread of infectious diseases.
-
-
-
Podcast
Zoë Rose: Ethical Hacker, Cyber Security Consultant, Baringa Partners
Zoë Rose is a highly regarded hands-on security specialist, who helps her clients embed resilience across their personal and professional lives. Zoë is a Cisco Champion, Splunk Architect, and has been recognised in the top 50 women in the UK along with the PrivSec 200.
-
News
New phishing scam uses audio voicemail recordings
Researchers have observed a new phishing campaign using a fake voicemail message to lure victims into entering their Microsoft Office 365 credentials.
-
News
McAfee, Symantec & Trend Micro breached by Russian hacking group
The three US-based antivirus software vendors that had been breached by a Russian hacking group have now been identified.
-
Feature
10 ways cybersecurity will evolve in the next five years
Looking back just 10 years, the cyber threat landscape is almost unrecognisable. Back then most IT security threats were unsophisticated malware programs (mostly viruses, worms or trojans) written by people whose main aim was simply to cause trouble.