Post of category Cybercrime

Cybercrime · Cybersecurity Strategy · Data Security

Phishing on behalf of the coronavirus

That's all we needed: As if the effects of coronavirus on everyday life are not bad enough, cybercriminals are now using the virus as bait in various phishing campaigns. Numerous security companies...

Cybercrime · Cybersecurity Strategy · Data Security

Office 365 - The enemy in my inbox

Just as things don’t always go to plan in practice this is also true of information security. Although the security world are discussing defense strategies involving microsegmentation and artificial...

Cybercrime · Cybersecurity Strategy · Data Security · Encryption · HIPAA

Best Practices for Securing Healthcare Data

The escalation of ransomware and trojan malware combined with the lack of endpoint security caused the healthcare sector to suffer from massive data breaches in 2019. As healthcare organizations rely...

Cybercrime · Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

The Worst Data Breaches of 2019

Another day, another data breach. With more than five thousand data breaches and over seven billion records exposed, 2019 was the worst year on record for breach activity. According to research from...

Cybercrime · Cybersecurity Strategy · Data Security · Encryption

Online Shopping this Holiday Season? Here's How to Stay Protected

With the holiday season in full swing, retailers and e-commerce stores are once again competing with the lowest prices and best bargain deals to draw in new customers and increase sales. Nearly 190...

Cybercrime · Cybersecurity Strategy · Data Security · Internet of Things

Cybercriminals Migrate to Mobile Banking

We live in a connected world. Life without our mobile devices providing us with constant, easy access to a wealth of apps and services is scarcely imaginable. For all this convenience, however, there...

Cybercrime · Cybersecurity Strategy · Data Security · Internet of Things

Risk to Business Travelers’ Data Grows

Business travel is a fertile hunting ground for hackers. Sensitive company data is seldom more at risk than when employees are on the road. The travel sector is notoriously susceptible to large scale...

Cybercrime · Cybersecurity Strategy · Data Security

A risky business: what happens when transferring risk goes wrong?

The title of this article might seem a little confusing so let's start by breaking things down. Once a risk analysis has been conducted and the risks facing a company have been identified, for example...

Cybercrime · Cybersecurity Strategy · Data Security

ECSM 2019 – Cyber security affects us all

Cyber security has many facets and affects all areas of our digital lives, both professional and private. In some environments, information security is mandatory where regulatory requirements foresee...

Cybercrime · Data Security

Intel processors: More holes than Swiss cheese?

Things had just begun to quieten down at Intel after Spectre and Meltdown, as the next dramatically named processor security vulnerabilities were announced. The ZombieLoad and Store-to-Leak Forwarding...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK