Cybersecurity Insider Threats: The People You Thought You Could Trust

Cybersecurity Insider Threats: The People You Thought You Could Trust

When you think of insider cybersecurity attacks, you might immediately envision an angry former employee or one that is disgruntled and getting ready to leave. While these are situations that do occur, there is another element that is just as important for your focus, and these are referred to as “accidental/unintentional threats.”  Both forms of cyber threat need to be taken seriously, and both types also involve a psychological aspect.
https://www.computerweekly.com/opinion/Information-security-risk-keeping-it-simple?src=5798104&asrc=EM_ERU_101142024&utm_content=eru-rd2-rcpD&utm_medium=EM&utm_source=ERU&utm_campaign=20181001_ERU%20Transmission%20for%2010/01/2018%20(UserUniverse:%202637481) https://searchcompliance.techtarget.com/definition/risk-management

Understanding Cybersecurity Risk Management

For many organisations, the concept of risk management is a term that they only relate to investments or possibly the launch of a new product. Few have instituted the critical actions of risk management when it comes to cybersecurity. This attitude can be compared to the “it won’t happen to me”perspective, and when it comes to a major cyberattack that you were unprepared for, it can mean the loss of your
Cybersecurity Best Tips and Practices

Cybersecurity Best Tips and Practices

The era of the image of a cybercriminal hiding in a basement for attacks is gone. While there may be a few that continue to use that method, a majority of those involved in cybercrime have developed into sophisticated entities that emulate the planning and execution of a well-organised corporation. The first step in protecting yourself and your company is to understand that cybercriminals have profited to such a degree
The ease of hacking smart homes and offices and How You Can Protect Yourself

The ease of hacking smart homes and offices and How You Can Protect Yourself

Smart homes and offices were once thought to be the wave of the future, but are clearly here now. When it comes to new technologies, we seem to never be able to get enough and new devices are being added every day for efficiency and convenience. As many are jumping on the bandwagon to transition their homes and offices into the “internet of everything”, we need to step back and
The Buzz About Fileless Malware

The Buzz About Fileless Malware

When it comes to being devious, cybercriminals are relentless and in their world this means seeking out new ways of thievery. Those that specialise in malware have been using standard methods for the last number of years. As security software and firewalls begin catching them, they are now developing a newer way to access your data and this involves what is being called “fileless malware.” Cybercrime relies on the fact