Opinion

General

DDoS Attacks on the Educational Sector are Threatening Online Learning

With the onset of Covid, online classes are starting to become a staple of modern learning. Many schools, colleges, and universities remain closed for months due to social distancing. Over 1.2 billion children are out of school globally.
Instead of whiteboards, we’re starting to use digital boards and software such as Miro. Instead of classrooms, we’re using Zoom and Skype calls. And for many, the only way to find out when the next lesson is starting is to look up a digital timetable on a school’s website.
At the same time, online learning infrastructure is largely unprotected. Many local schools or university websites operate under the pretense that they won’t become a DDoS target. And it’s easy to think that way. These platforms are small, they don’t generate a lot of income, if any, and they contribute to a good cause. So who would DDoS them?
and launch a powerful network flood for just a few dollars.

Read More
General

The Thriving Underground Economy and How It’s Increasing Hacker Capabilities

The spread of ransomware has reached unprecedented levels; every few days, there are headlines about new attacks crippling major companies or organizations. Some of these attacks have resulted in 8 figure ransoms, but the damage caused by downtime and data leaks is much larger than losses to ransoms.
A lot of the profits hackers are raking in get reinvested in enhancing their capability. All of this cash is driving the growth of an increasingly advanced and sophisticated underground economy, and with it, an expansion in hacker capabilities.

Read More
General

Prevention is Better Than Cure: The Ransomware Evolution

With the number and frequency of ransomware attacks increasing, not to mention the innovation in distribution methods, this should be a wake up call for organisations to strengthen their defences. By taking a preventative approach, businesses can take the necessary steps to strengthen their cybersecurity posture. This includes a combination of education, processes, hardware and software to detect, combat and recover from such attacks if they were to arise.

Read More
covid-19General

4 Steps to Creating Effective Post-Pandemic Data Security

Even before the COVID-19 pandemic, enterprise organisations faced seismic shifts in how they meet data privacy and security requirements. Whether due to mandated regulatory controls, ever-evolving digital transformation projects, or changing market conditions, keeping up with data security was like hitting a fast-moving target.
Despite their adaptability to staffers working remotely, however, many organisations remain wedded to outdated security protocols that don’t reflect this new work-from-home reality. If your organisation hasn’t changed data security priorities to keep up with the rapid shift to remote work environments, you may struggle to ensure that remote-work employees are secured and empowered to work from anywhere.

Read More
General

CSA – Cloud Security Framework

A few weeks ago, an article on the new CIS 18 framework was published on this site. CIS is one of the go to frameworks for security assessments, but the cloud has its own set of controls and a framework developed by the Cloud Security Alliance (CSA). They have recently released a new version of their framework as well. This article will introduce the CSA and its security framework.

Read More
General

Cyberattacks Shine Spotlight on Operational Technology Vulnerabilities for Every Industry

Recent high-profile ransomware and cyberattacks expose vulnerabilities in commercial buildings that are far too widespread. In fact, the same headline-making exposures of late can be faced by any company that uses operational technology (OT) and information technology (IT).
Smart leaders across the nation and around the world should be thinking: “Maybe it could happen here.” The question becomes how to prevent similar attacks and how to position your organization to meet upcoming cybersecurity mandates with wide-ranging implications. Those of us in the cybersecurity business are aware of many such incidents, including some stories from my experience.

Read More
General

Cybersecurity Rising Among America’s Infrastructure Priorities

Less than a month ago, President Biden released his proposed budget for Fiscal Year 2022 that includes $9.8 billion in funding for cybersecurity enhancements. Cyberbreaches are making the headlines too often – almost on a weekly basis – and those are only the attacks that are reported. Not only are the breaches costly, but they also are dangerous. Potential threats to public safety as a result of cyberbreaches, in fact, are daunting. The Administration has made it clear that the Federal government intends to provide as much protection to the nation’s overall infrastructure as possible.

Read More
General

10 Small Business Cyber Security Statistics That You Should Know – And How To Improve Them

All enterprises have to handle customer data, including PII, but often small businesses do not have the resources to effectively safeguard against cyber threats.

In the latest Cybersecurity Magazine article, Ashley Lukehart offers 10 important cybersecurity statistics regarding the reality of cyberattacks on small businesses, and gives some tips on how small businesses should approach cybersecurity attack prevention

Read More
General

Zero Trust Security Best Practices

Since the start of the COVID19 pandemic, enterprises worldwide have adopted the work-from-home model. This shift has resulted in an increase in cyberattacks, and some traditional models of security are becoming ineffective as employees increasingly access resources remotely and use personal devices.
In the latest Cybersecurity Magazine article, Varin Khera argues for the use of ‘zero-trust’ security models and examines the best practices for adopting such a model.

Read More