One of the priorities of every cybersecurity organisation is to explain that a majority of breaches in a system occurs due to compromised “privileged access” accounts. Depending on the age and size of a business, privileged access account management could have gone unchecked for years to decades, allowing an increasing number of accounts to access […]
The problem with extremist apps, websites, and social media is that those that join them are typically also those that believe conspiracy theories. In other words, they have a desire to believe what they want instead of fact checked sources and their gullibility makes them easy prey for cybercriminals. The popularity of apps such as […]
Online privacy is a growing concern for internet users all over the world. Data brokers, online advertising companies, and big tech giants are coming up with more ways to track you on the internet. Applications and online services collect user data, so much of it that it’s almost impossible to keep track. The ever-changing nature […]
As countries around the globe step up their game to combat cybercrime, companies and organisations are being required to follow through with self-examination, upgrades, and consideration of all breach methods.
Early on, companies took a very serious view in their requirement standards for “data sharing” and this often included policies for access in production environments