Network Security – A Process Perspective
Network Security Network security is a big concern these days. Although one could classify the work behind network security as being an essential but non-value added effort, nevertheless it is...
View ArticleWhy Cybersecurity Should Be Your No 1 Priority #tech2016
More SCADA system exploits are likely to be reported. DDoS attacks and ransomware will continue to trouble organisations. Privacy issues will gain prominence, nationally and internationally, keeping...
View ArticlePay Attention To Your IoT Device Security
Wow cool! A device that lets you know, via Internet, when your milk is beginning to sour! And a connected thermostat – turning the heat up remotely an hour before you get home to save money…and...
View ArticleWhen Mobile Meets Cloud: Why CASBs Matter
The perception in the industry seems to suggest that most businesses are overwhelmingly using the cloud these days. Surprisingly, the truth is that only 37% actually are. However, within the next four...
View Article11 Ways to Mitigate Insider Security Threats
In today’s world, companies are constantly attacked by hackers, but what if those attacks come from the inside? More companies than ever before are dealing with insider security threats. Here are 11...
View ArticleBYOD – Creating A Balance Between Flexibility And Safety
Personal mobile devices and external data access promotes flexibility and improves employee productivity. However, it opens up the possibility of security breaches. Simple things like forgetting to...
View ArticleKey Trends Disrupting Messaging / Comms #tech2016
Messaging bots will become primary threat to traditional search. Users will be able to access information via conversation like exchange. SERPs will no longer exist, only top information will be used....
View ArticleScareware Scam Almost Snags Victim
Cybercriminals know that the best way to get their claws on the next victim is to appeal to their emotions, not logic. There are a lot of scary things in life, and one is learning that your computer...
View ArticleWhy Are Cyber Hucksters So Successful?
Often, hucksters prey on the consumer’s desperation, which is why it is no surprise that the No. 1 rip-off (at least between 2011 and 2012) was the popular market of bogus products promising weight...
View ArticleDiscover How Enterprise Mobile Technology Is Changing #tech2016
Enterprise mobile security is going to move from the top device and application layer to the bottom layer – data. Every data bit will be controllable by the enterprise. Ninh Tran, Hiretual Mobile...
View ArticleAccess denied, and what’s behind?
When surfing the web, all of us, every now and then, stumble upon the pages that fail to load. The browser tab may return some obscure references. This article reviews the most common instances. Our...
View ArticleRansomware in the Wild: Statistical Overview
Ransomware is a continuously growing threat to individual computer users and organizations worldwide. It typically leverages an uncrackable combo of RSA and AES cryptosystems to deny the availability...
View ArticleClosing the Security Loopholes in Your IT Infrastructure
Breach. The word calls to mind all sorts of things, from Shakespeare to spy movies. Almost all involve attackers breaking in from outside. Tom Cruise suspended inches above the floor in Mission:...
View ArticleCloud Security: 23 predictions you need to know
Cloud companies are struggling to balance security against availability and privacy. New innovative security methods are being developed to create this balance, but the future of Cloud Security is in...
View ArticleMoving to a Hosted PBX or On Site IP PBX?
Evolving technology in networking is allowing for significantly higher data throughput which translates to higher internet speeds available to consumers & organizations. For consumers it means...
View ArticlePhishing Attacks Two-Factor Authentication
Hackers bank heavily on tricking people into doing things that they shouldn’t: social engineering. A favorite social engineering ploy is the phishing e-mail. How a hacker circumvents two-factor...
View ArticleKeRanger Mac Ransomware Virus
KeRanger is the first working Mac ransomware virus, and it’s not theoretical, it’s real and in the wild. The attacked Transmission app was spread from the official Transmission webpage earlier this...
View Article3 Steps For Secure Cloud Deployment
Attacks on cloud-based services rose from 19 percent two years ago to 33 percent in 2015, according to Arbor Worldwide Infrastructure Security Report XI, 2016. As the number of enterprises moving data...
View ArticleSecure And Interconnected Smart Home
Smart Home Technologies will need to think about baking security into their systems, as hackers are increasingly seeing connected devices as a ‘weak link’ and easy way into a person’s network and...
View ArticleWhat Your Competitors Know About Data-centric Security
Data-centric security, at its heart, is just another lock. But what happens when that lock is picked (keys stolen, credentials compromised)? Over the coming quarters, effective monitoring and access...
View Article