Creating a Good COVID-19 Security Plan

Creating a Good COVID-19 Security Plan

The COVID-19 pandemic has hit just about every country and cybercriminals have taken full advantage of its crippling effects. The sheer volume of increased cyberattacks has exposed the vulnerability of individuals, businesses, and governments. Scam e-mails from what appear to be valid sources such as the World Health Organization or government health websites have opened up a dam of viruses and malware in a time when people should be focusing
https://www.computerweekly.com/opinion/Information-security-risk-keeping-it-simple?src=5798104&asrc=EM_ERU_101142024&utm_content=eru-rd2-rcpD&utm_medium=EM&utm_source=ERU&utm_campaign=20181001_ERU%20Transmission%20for%2010/01/2018%20(UserUniverse:%202637481) https://searchcompliance.techtarget.com/definition/risk-management

Understanding Cybersecurity Risk Management

For many organisations, the concept of risk management is a term that they only relate to investments or possibly the launch of a new product. Few have instituted the critical actions of risk management when it comes to cybersecurity. This attitude can be compared to the “it won’t happen to me”perspective, and when it comes to a major cyberattack that you were unprepared for, it can mean the loss of your
Malvertising - davinciforensics

Malvertising: Accessing Your Data through Legitimate Advertising

Both consumers and businesses have long made the assumption that malware is delivered in a variety of ways, but most are through accessing low-level websites or opening email. As with any form of cyber hacking, the criminals have developed even more sophisticated methods and the most recent has been sending malware through legitimate advertising areas.  This process has opened the portal to unknowing consumers that are downloading everything from ransomware
5 Major Short List Topics to Help Deter Your Security Risk

5 Major Short List Topics to Help Deter Your Security Risk

Chief Information Security Officers have made some radical changes over the last year or so, including the understanding that security breaches involve a number of variables. From internal and external sources to the very technology that we use to do business, CISO’s are taking action to address these and other issues to deflect the risk of security problems.  The entire topic may seem overwhelming to some, but every company is
healthcare-cyberattack-davinciforensics

South African Healthcare Industry Vulnerable for Cyberattacks

Cyber criminals are always on the lookout for the easiest way to breach a system. In the past, this often involved sophisticated coding to break into a network and steal critical data. However, the criminals have changed their method of attack as well as their focus. Over the last year or so, they have turned their attention to those industries that are most vulnerable as well as making use of