risk management

Browse by

Clear

risk management

Best Practices for Securing Educational Resources in the Age of Distance Learning

According to Microsoft’s Global Threat Activity Tracker, more than 4.7 million malicious software (or “malware”) incidents were detected in the education industry worldwide in June 2020 – which accounted for more than 60 percent of all the corporate and institutional malware incidents reported during the month, the most affected industry by far. More than 20 universities and charities across the United States, United Kingdom, and Canada reported that they were compromised by a cyberattack.

risk management

Securing Your Assets Against Cybersecurity Threats

During the COVID-19 Pandemic, advanced persistent threats (APTs) are working overtime to steal information from secure systems. Protect and secure your information assets against these threats from now on.

risk management

Surviving Security Risks Existent in Third-Party Software

Third-Party Software is comprised of software libraries, modules and other components that are either purchased from a third-party vendor or made freely available. It includes open source software and commercial off-the-shelf components, which are components that are available for use straight away instead of building entirely from scratch, thereby reducing application development time.

risk management

Ways to Mitigate Social Engineering-based Cyber Attacks

Social engineering is an attack mechanism majorly aimed at misleading employees or individuals to hand over relevant information for the attacker’s financial gain. Social engineering attacks are launched mostly via email, social media, and over the phone.

risk management

Combatting the Security Risks of Cloud Computing

Small and large enterprises continue to benefit from increased digitization and greater use of cloud-based application and storage facilities. Cloud services are making it possible for businesses to place their information and data in “containers” that can be deployed consistently and reliably.

risk management

Protecting Sensitive data from Vulnerable Application User Interface

ProtonMail, a Swiss-based email service provider, duped a sophisticated phishing scheme against a team of journalists from Bellingcat. The cybercriminals had written an email that claimed to be from the ProtonMail team and asked for their login credentials. While the motives appear to be political, ProtonMail prevented their success by partnering with Swiss authorities in shutting down the web domains involved. Should the phishers have succeeded, ProtonMail’s user interface (UI) would have been easy to bypass — no matter how cutting edge their system’s security is.

risk management

How Businesses can Leverage Cyber Threat Intelligence

Ransomware has become one of the most pressing and expensive cybersecurity threats in recent years. According to Cybersecurity Ventures, a ransomware attack happens every 14 seconds, resulting in damage costs amounting up to $11.5 billion. These numbers are only predicted to increase the more daring cybercriminals become.

risk management

Insider Threat in Financial Sector

According to CA Technologies, 53% of the organizations they surveyed experienced an insider threat in the past 12 months and it is only growing in frequency. How can a company combat a threat when it’s coming from their own people?

risk management

Fighting Phishing in the Financial Sector

As Russia welcomed the warmth of spring last March 2018, dozens of banks experienced a phishing attack from a hacker group called Silence. The sender of the email was disguised as FinCERT, Russian Central Bank’s security arm. The emails had attachments that claimed to help standardize digital communication across all banks. In reality, the files contained Silence’ downloader to exfiltrate important data.

risk management

The Risks of Using Cloud Services

When J. C. R. “Lick” Licklider developed ARPAnet in 1962, he had the vision of creating a device that could receive and send data simultaneously amongst a large group of people. He called this idea the “Intergalactic Computer Network”. It carried the necessary principles that would find today’s Internet and, later, cloud computing and storage. In 2018, the Internet had 3.2 billion users. As a result, large amounts of data production and sharing created the demand for quicker, more collaborative storage solutions as an alternative to physical drives.

Subscription Center

Stay in the Know with Our Newsletter