If you look at the cybersecurity industry, sophisticated attacks are often matched by an equally sophisticated solution. However, those attacks and their solutions can only be understood by experts and are sometimes almost hypothetical.
 
On the other hand, studies still show that there is one basic attack vector we all should take care of better: people, i.e. humans.
Social Engineering attacks are not only common, but on the rise. Which makes sense, since it is the easiest vector to attack. In our special we talk about what social engineering is, its most common forms and how to counter it by raising security awareness.

Black Friday – Deals, Hacks and Scams Aplenty

With Black Friday and Cyber Monday fast approaching, this weekend is gearing up to be the biggest e-commerce event of the year. But, with this popularity comes the increased interest of cybercrimminals who seek to take advantage of retail’s busiest time of the year.

Read more...
IBM 2022 Cost of breach survey

Are we catching up to cyber criminals?

After decades cybercrime moving faster than the rest of the world, there are indications we may be catching up to cybercriminals. This new trend is

Read more...

Cybersecurity Awareness Month – How can Organisations Protect Themselves from Cyber Threats?

As the Western world continues to deal with the fallout of the COVID-19 pandemic, the war in Ukraine, and resultant economic headwinds, cybersecurity is more important than ever. Here is part 4 of our expert commentaries for Cybersecurity Awareness Month.

Read more...

Cybersecurity Awareness Month, part 3

Continuing our series on thoughts about Cyber  Security Awareness month, we have a some practical ideas and more expert quotes from around the industry.

Read more...

More Thoughts on Cybersecurity Awareness Month

It’s Cybersecurity Awareness Month – still. And we have more quotes from industry experts about cybersecurity awareness.

Read more...

What famous identity thefts can teach our businesses nowadays

There have been numerous cases of identity theft throughout history, some more famous than others. While the techniques have changed throughout time, the truth is there is not much difference. 

Read more...

Cyber Insurance Providers Buckling as Breaches Boom

With almost $7 billion in claims last year, an industry that is too important to fail is looking to reduce client risk by focusing on the crux of the problem, human error

Read more...
scam bucket

Scam Bucket: How common courtesy makes you vulnerable

Office phishing is a scam that uses common courtesy to make you vulnerable to digital criminals. This edition of Scam Bucket breaks it down for

Read more...

Is that Really You – how business email is compromised

Business Email Compromise (BEC) is a serious threat, and it often goes unnoticed. Read here what you can do about hackers impersonating your CEO or CFO in our latest guest Article from Alejandro del Hoyo.

Read more...

How Criminals Attack the Building Blocks of the Internet

It’s not a surprise that cyber criminals have identified APIs as one of the most lucrative targets when it comes to retrieving sensitive information. Here are some ideas how to prevent API attacks.

Read more...

Web Scraping: A Critical Tool For Threat Intelligence

Cyber threat intelligence is a vital strategy that prevents attacks, and web scraping is critical to its success.

Read more...

Roblox Hack: don’t let cybercriminals blindside you

Last month, it was reported that Roblox – an online game creation platform – had suffered a data breach after one of its employees fell

Read more...

Promoting Cybersecurity for Accountants

Often, the weakest link in cybersecurity is considered to be people, as 85% of successful cyberattacks involve some form of human element. Employees in accounting are highly vulnerable to these breaches.

Read more...
RSAC2022 North Hall

Is your freelancer a nation-state hacker?

The Biden administration warned in May that the freelancer you hired to code may be a North Korean spy. These cyber spies are posing as remote, contract IT workers and infiltrating malware into all forms of networks

Read more...

The Psychology Behind Cybersecurity

With seemingly no end to the growing problem of cyberattacks in sight, the cybersecurity industry is increasingly looking to address the root of the problem; humans.

Read more...

WannaCry: Ransomware defence, five years on

In 2017 the largest ransomware attack in history – WannaCry – swept across the globe, infecting a quarter million machines in more than 150 countries. What lessons can be drawn from the attack, and how can businesses keep their systems secure?

Read more...

Trending Topics: Phishing, Social Media and Malicious Email Attacks on the Rise

Newly published research gives new insights into the key cybersecurity challenges including the prevalence of social media attacks, phishing and malicious email attacks. It reveals how threat actors are shifting strategies as they look for ever more effective ways to mount attacks emphasising that organisations must remain vigilant.

Read more...

Mitigate Cyber Risks During the Ukraine War

Many experts believe cyberattacks against countries imposing sanctions against Russia are imminent. Organizations should be on high alert for the cyberattacks recently used in this conflict.

Read more...

Leave a Reply

Your email address will not be published. Required fields are marked *