De-Risk Your Technology Infrastructure with These Cybersecurity Practices
Digitisation has unlocked a world of possibilities. But it is also a treacherous minefield of cybersecurity vulnerabilities. The interconnected digital economy makes every company, big or small, a potential target for cyber attackers. Today’s tech infrastructure and the connected ecosystems are extensive and shifting. Many users access the infrastructure daily and share information. Lurking cyber […]
How to Create a Cyber Security Awareness Training Program
Cyber security threats are at an all-time time, with global cybercrime costs expected to touch $10.5 trillion a year by 2025. Cyber security is now too big to be the IT team’s responsibility. It requires a concentrated enterprise-wide effort to thwart cyber attacks. Approaches to combat the menace vary depending on the budget, size, and […]
“Disturbing” Rise in Nation-State Cyberattacks
Microsoft’s 2022 Microsoft Digital Defence Report focuses on the ‘rise in nation-state-sponsored cyberattacks. Threat actors from North Korea, Iran, Russia, China and other countries engage in ransomware, business email compromises, crypto theft, cyber-espionage, hack-and-leak attacks, and other types of attacks. There has been a spurt in such attacks over the last year. Russian attacks against […]
7 Cybersecurity Predictions for 2023
Cybersecurity is evolving. New threats emerge, some old ones disappear, and the threat landscape shifts constantly. Here are seven general trends that will shape cybersecurity in 2023. 1. Growing Threats in 5G, IoT and other connected devices The most frequent and common type of security incidents in 2023 will involve IoT sensors and smart devices. […]
How to overcome the Menace of Insider Threats in Financial Services
Ransomware operators and other threat actors are targeting the financial services industry more intensely than ever. The financial service sector has more robust cyber defences compared to other industries. But many companies in the sector have rogue insiders. Insider threats are internal users, such as employees or contractors with network access, who compromise critical data or […]
Supply Chain Cyber Security: Six Important Advances
Businesses rely on third-party shippers, outsourced customer support agents, and other independent contractors. The involvement of such third-party vendors has increased over the last couple of years. The fragmented business ecosystem makes such independent vendors integral to the ecosystem. But such supply chain partners also pose huge cyber risks for the business. Compromising the partner’s […]