General

General

How to Balance Cybersecurity and Productivity

Today’s business world is becoming more data-driven and increasingly remote at a rapid pace. New technologies enable companies to gather more information, while the COVID-19 pandemic ushered in the unprecedented trend in remote work.
Many businesses realize the benefits of employees working remotely, but unfortunately, so do cybercriminals. Threat actors are capitalizing on the remote work trend and executing a range of cyberattacks to exploit companies and their sensitive data. At the same time, emphasizing employee productivity is a top concern for most employers.
Cybersecurity and productivity are two critical components of any business, regardless of industry. However, finding a healthy and suitable balance can be challenging. Employees require access to company data during the workday, and IT professionals must implement strong cybersecurity measures to protect that information. How can the two functions work in tandem?

Read More
General

Pain-Free Cloud Security Transformation? There’s No Such Thing

Seemingly all companies today prioritize cloud security as part of a comprehensive cybersecurity strategy, and for good reason. The proliferation and sophistication of cyberattacks bring endless possibilities for hackers to steal and misuse data at a pace previously unimaginable. Ransomware alone rose more than 100 percent in volume globally in 2021, and the expectation is that with such “success,” the rate of attacks will only grow in 2022.
Yet, too many enterprises and smaller companies still struggle with the transformation to the cloud because of the variables that come along with choosing the best product. Lack of awareness about the complexities with the switch, namely technology-related issues and typical adjustments needed to workflows and processes, also contributes to the confusion. Adding to the quandary is the existence of very few companies that are dedicated to cloud security as opposed to general cybersecurity products.

Read More
BusinessGeneral

Security Considerations in Choosing Cloud Data Platforms

Cloud security is more important than ever. Cybercrime is on the rise, and changes in the business world — the pivot to work from home — have made companies of all kinds more vulnerable to cyberattacks.
Data security has become a critical consideration for businesses migrating to the cloud or building a multi-cloud environment. It’s vital to know what to keep in mind when choosing a cloud data platform. Here are some things savvy companies should consider when making their selection.

Read More
General

Model behaviour: Using AI to beat financial cybercrime

As the gatekeepers to personal and business wealth, banks and financial institutions are prime targets for cybercrime.  Financial cybercrime attempts are increasingly frequent, costly and highly successful in many cases. According to research and advisory group UK Finance’s report Fraud – The Facts 2021, the sector prevented £1.6bn of unauthorised fraud losses in 2020, approximately £6.73 in every £10 attempted. UK Finance’s Information and Intelligence Unit also helped protect over 2.1 million compromised card numbers in 2020.

Read More
BusinessGeneral

Closing the Cybersecurity Communications Gap: What Every CISO Needs the C-Suite to Know

The role of the Chief Information Security Officer (CISO) has evolved considerably in recent years. So much so that in many organisations CISOs now regularly consult with the CFO, CTO and CEO on security strategy, cyber risk, and how to approach digital transformation. However, while some CISOs have been given a seat at the table on many executive boards, this hasn’t been the case everywhere.
In the past, digital security was a high priority for highly regulated industries such as banks, insurance companies as well as utilities and public sector organisations. But the recent and rapid escalation of online channels in the wake of the global pandemic has made companies in every industry sector a potential target for cyber criminals. This means C-Suite executives need to be fully informed and educated on the preventative steps that need to be taken – and why.

Read More
General

6 Things You Shouldn’t Do When Your Email is Attacked

When you suddenly discover that your email is attacked or hacked, it can be a scary situation. There’s also been a rise in the frequency of email attacks. Studies have shown that around 81% of companies worldwide have been victims of email attacks since March 2020.
This article will highlight six different “do nots” that victims of an email attack should avoid and what to do instead. Keep reading to find out how you can best tackle the situation securely, should it ever arise.

Read More
General

The Cybersecurity Risks of Cryptocurrency

The evolution of cryptocurrency has taken the world by storm in the past decade. In 2013, there were only 66 types of cryptocurrency worldwide. In February 2022, Statista reports around 10,397 cryptocurrencies that people can invest in.

Cryptocurrency, often referred to as just crypto, is a form of digital money. This electronic currency uses blockchain technology, a secure, digital ledger containing crypto transactions.

While many investors are keen on learning about crypto, following the latest crypto trends and making a profit, it’s critical to weigh the risks associated with trading cryptocurrency.

Below, we’re going to discuss some of the cybersecurity risks associated with investing in crypto, as well as some ways to protect yourself when investing your hard-earned money into digital tokens.

Read More
General

Ethics of the 0-day trade

This is an opinion piece, and an opinion that I am fully aware of, can be controversial in some sectors of the cybersecurity industry. Still, selling the state of the cybersecurity of customers, that most of us are doing our outmost to protect from the nefarious underbelly of the Internet, is actively undermining the security. And yes, I feel that it is actively undermining the security, to sell 0-days to brokers, on the darknet or companies on the Internet, instead of disclosing them to the vendors for patching.

Read More