Search Results for: cyber security risks Blog Post Cyber Security Risks Related to the Novel Coronavirus – COVID 19 March 11, 2020 We in LIFARS are carefully following the latest developments in the cyber security realm. Thus, we are not surprised, that... Blog Post Organizing Cyber Security Risks in a Company January 5, 2020 Looking Back 5 Years, Looking Forward 5 Years in our Digitally Connected World In the past five years, we have... Blog Post Understanding & Integrating Cyber Security Risks into A Risk Management Program January 15, 2020 Cybersecurity is a field that protects the confidentiality, integrity, and availability of digital information. We are now at... Blog Post Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective... Page Information Security Newsletter – Data Security, Cyber Defense Strategy and Risk Vulnerability Management Tips May 22, 2020 Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... Blog Post Czech Republic’s Hospital is Hit by Cyberattack Amid Pandemic March 18, 2020 The Brno University Hospital in the city of Brno, the Czech Republic suffered a cyber attack during a COVID-19 outbreak.... Blog Post The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition... Blog Post GAP in the Cyber Industry May 14, 2020 With increased cyber security risks and attacks, the cyber security gap has been in discussion lately. It is a rising ... Blog Post Cyber Criminals are Leveraging Coronavirus to Boost Profit March 15, 2020 There are Coronavirus (COVID-19) related Cyber threats like: Social engineering attacks and phishing especially. They use social engineering attacks to... Blog Post VPN Security is Highlighted With Everyone Working From Home March 22, 2020 The Internet is indeed a wonderful invention, but as we all know, risks can be hidden everywhere on the Internet.... Blog Post FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system.... Blog Post “We Swear, We Will Not Cyber-Attack Your Healthcare Company During Coronavirus Pandemic” March 21, 2020 Two leading cybercrime gangs who committed two of the most prolific ransomware threats promised that they will not attack healthcare... Page LIFARS Cybersecurity Advisory and Consulting Services August 17, 2020 Page Post Ransomware Threat Hunting Services July 9, 2020 Elevate your organization’s cloud security posture from strategy to incident response. As more companies select different SaaS, IaaS and PaaS...
Blog Post Cyber Security Risks Related to the Novel Coronavirus – COVID 19 March 11, 2020 We in LIFARS are carefully following the latest developments in the cyber security realm. Thus, we are not surprised, that...
Blog Post Organizing Cyber Security Risks in a Company January 5, 2020 Looking Back 5 Years, Looking Forward 5 Years in our Digitally Connected World In the past five years, we have...
Blog Post Understanding & Integrating Cyber Security Risks into A Risk Management Program January 15, 2020 Cybersecurity is a field that protects the confidentiality, integrity, and availability of digital information. We are now at...
Blog Post Threat, vulnerability, risk: What is the difference? July 22, 2020 Threat, vulnerability and risk are terms that are commonly mixed up. However, their understanding is crucial for building effective...
Page Information Security Newsletter – Data Security, Cyber Defense Strategy and Risk Vulnerability Management Tips May 22, 2020
Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
Blog Post Czech Republic’s Hospital is Hit by Cyberattack Amid Pandemic March 18, 2020 The Brno University Hospital in the city of Brno, the Czech Republic suffered a cyber attack during a COVID-19 outbreak....
Blog Post The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition...
Blog Post GAP in the Cyber Industry May 14, 2020 With increased cyber security risks and attacks, the cyber security gap has been in discussion lately. It is a rising ...
Blog Post Cyber Criminals are Leveraging Coronavirus to Boost Profit March 15, 2020 There are Coronavirus (COVID-19) related Cyber threats like: Social engineering attacks and phishing especially. They use social engineering attacks to...
Blog Post VPN Security is Highlighted With Everyone Working From Home March 22, 2020 The Internet is indeed a wonderful invention, but as we all know, risks can be hidden everywhere on the Internet....
Blog Post FBI Warns of Windows 7 end-of-life Security Risk August 28, 2020 Earlier this month, the FBI sent out a warning to U.S. private sector partners about the Windows 7 operating system....
Blog Post “We Swear, We Will Not Cyber-Attack Your Healthcare Company During Coronavirus Pandemic” March 21, 2020 Two leading cybercrime gangs who committed two of the most prolific ransomware threats promised that they will not attack healthcare...
Page Post Ransomware Threat Hunting Services July 9, 2020 Elevate your organization’s cloud security posture from strategy to incident response. As more companies select different SaaS, IaaS and PaaS...