Latest Security Opinions
A common assumption about cyber attacks is that they’re all about theft. But that’s not always the case, as data manipulation attacks illustrate. This type of attack is where cyber criminals access the target system and make undetected changes to data in order to elicit some form of gain, but without any outright theft taking place. Sometimes referred to as “the hack you might not notice”, they have the potential to cause immense damage.
How long until a compromised smartwatch brings down a company’s cyber defences? According to cyber security expert Chester Avey, the clock is ticking.
Cybercrime is getting smarter and data is growing in value. So, as cyber-attacks become more sophisticated, businesses need to rise to the challenge and protect their digital operations. This October is National Cybersecurity Awareness Month, which aims to draw attention to the threats that are putting businesses, and individuals, at risk. To highlight the importance of this awareness month, Techerati spoke with seven industry experts to get their thoughts and advice.
Over the past few years, cyber security specialist Frank Satterwhite has been working with a talented group of cyber engineers to create and package a security platform that allows users to protect their data in cyberspace. One of the group’s key focuses is on increasing mobile cyber hygiene as smartphones become the default device for most digital tasks at home and, increasingly, in the workplace.
Smartphones have become the central tool of our daily digital lives, whether for facilitating quick communication with friends and family, browsing social media or keeping up to date with the latest news. But from a cyber security perspective, mobile devices present easy targets for hackers seeking to compromise personal data.
In a few short years, Slack has transformed from a relatively unknown cloud application into one of the most popular team collaboration solutions in the world. For many enterprises, Slack is initially used in small, unsanctioned (shadow IT) deployments amongst internal workgroups. From there, use of the app typically balloons so quickly that it simply cannot be ignored. Today, Slack boasts over 10 million daily active users and more than 85,000 paying customers worldwide.
Ecommerce is booming, it’s fast-moving and exciting. However, someone is trying to steal from you – but they aren’t taking your products. They are pickpocketing your customer’s data, directly from their machines and in the process damaging your reputation, sometimes irreparably.
Data breaches are not a new phenomenon; the frequency and size of attacks have increased dramatically since Magecart first appeared in 2015. Even worse, you now have to publicly report them to the ICO. Damage limitation has never been so important.
It’s Rugby World Cup time in Japan, with the first round of rugby union’s most elite competition kicking off over the weekend. During the next few weeks, thousands of fans will travel far and wide across the country to soak up the action. In addition to bringing bundles of optimism about their teams’ prospects, die-hard supporters will arrive armed with a legion of connected devices.
Chester Avey outlines what firms must prioritise in the fight against the latest ransomware threats It might seem like a long time ago since WannaCry, which caused widespread disruption to the NHS other businesses, but ransomware attacks continue to make headlines. In fact, two very recent attacks successfully targeted two major US cities, Baltimore and… Read More
Within the next two years, the amount of smartphone users will reach over 2.87 billion, from 2.57 billion users today. The majority of these users have always-on internet connectivity, providing them the ability to control devices from the palm of their hand, but how does this functionality connect to devices at home or at work?
When your individual devices are secure, the main point of entry into your IoT is going to be through your main network. There are many different methods that you can use to secure your networks against potential threats, but here are a few of the most effective: