Business Email Compromise (BEC)Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions... BLOG Attacked? These Are The Critical Steps You Should Take June 15, 2020 While prevention is key to limiting cyber crime’s impact on business, having a proper cyber recovery strategy is just as... The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the... 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal... Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an... Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”... Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in... Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like... What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in... Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a... Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to... Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker...
Business Email Compromise (BEC)Business Email Compromise (BEC) is also known as Email Account Compromise (EAC) which has caused financial losses in the billions...
BLOG Attacked? These Are The Critical Steps You Should Take June 15, 2020 While prevention is key to limiting cyber crime’s impact on business, having a proper cyber recovery strategy is just as... The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the... 10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal... Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in... Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an... Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”... Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in... Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government... Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like... What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in... Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by... DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a... Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to... Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker...
Attacked? These Are The Critical Steps You Should Take June 15, 2020 While prevention is key to limiting cyber crime’s impact on business, having a proper cyber recovery strategy is just as...
The effectiveness of cyber security Early Warning Systems (EWS) June 8, 2020 Traditional network-based intrusion detection (IDS) or intrusion prevention (IPS) approaches have proved incapable of handling the upcoming challenges in the...
10 Ransomware Strains by Advanced Cyber Gangs June 5, 2020 With the Coronavirus pandemic, healthcare organizations, their suppliers, government agencies, and educational software providers have been targeted by cyber criminal...
Impact of Data Breaches on Businesses Reputation and How to Minimize Risk June 3, 2020 To avoid a major loss post a data breach, every organization must have an incident response plan and engage in...
Attacks on Internet of Things. How to Reduce Cost and Improve Safety of IoT? June 3, 2020 In the world of technology, the term ‘Internet of Things‘, can be any natural or man-made object that has an...
Cyber Security Webinar On-Demand: Workforce Diaspora – Adapting to Secure the Remote Workforce June 1, 2020 Free cyber security webinar on demand powered by LIFARS and Darktrace: “Workforce Diaspora – Adapting to Secure the Remote Workforce”...
Key Cyber Risks and Threats June 1, 2020 No matter how small your business is, there should be an awareness and basic understanding of the threats posed in...
Fake Windows update (Hidden Ransomware) May 31, 2020 Ransomware has developed into a ‘criminal malware of choice’ in recent times, especially when it comes to hitting local government...
Do You Have a Data Loss Prevention (DLP)? May 29, 2020 In a normal course, business might send many kinds of data across the network. These might include sensitive information like...
What are Indicators of Compromise (IoCs) Used For? May 27, 2020 Many times when a cyber breach occurs, organizations do not have any evidence. Similar to a Crime that occurs in...
Ransomware as a service (RaaS): What is it and How Does It Work? May 23, 2020 Ransomware, dating back to 1989, is a variety of malware that attempts to extort money from a computer user by...
DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a...
Man in the middle attacks in Mobile Devices May 18, 2020 Mobile security has always been a weak link for cyber attacks in organizations since mobile devices have been introduced to...
Advanced Persistent Threats: Are They Dangerous? May 16, 2020 An advanced persistent threat, commonly referred to as an APT, is a type of a cyber attack where an attacker...