Malware viruses are one of the most pervasive cyber threats organisations and individuals face. So much so, that malware viruses are one of the first things to come to mind when most people think about cyber attacks in general. In this post, we take a look at malware viruses, the various symptoms of malware, and how to know if your … Read More
What You Need to Know About Signature-based Malware Detection
Malware detection calls for the use of tools and techniques to identify, alert, block and respond to malware threats, such as downloading a malicious code. Basic malware detection methods can help identify and restrict known threats while advanced malware detection tools use machine learning and artificial intelligence (AI) to seek out and identify new and unknown threats. Signature-based detection is … Read More
What is Anti Malware?
Whether viruses, Trojan horses, ransomware, or rootkits, malware is one of the most common and frequent cyber threats companies face. So much so, in fact, that there were an unbelievable 5.5 billion malware attacks worldwide in 2022. Moreover, ransomware, a single variety of malware, cost companies $4.54 million, on average, in 2022. Consequently, organisations need to take their malware mitigation … Read More
What is vulnerability remediation in cyber security?
While the current phase of rapid digital transformation has brought a significant number of benefits, the main drawback is the huge increase in the number of cyber security vulnerabilities that cybercriminals can exploit. New technologies, whether digital wallets, contactless cards, smart appliances, the Internet of Things (IoT), etc., mean more digital data to secure and a larger attack surface to … Read More
What is application blacklisting?
Application security breaches are one of the most common cyber threats companies face. Malicious actors can use vulnerabilities in one of the many applications an organisation uses to get past their cyber security defences and access their network. Application blacklisting, also often called application blocklisting, is the process of implementing security measures that prevent particular software from being installed on … Read More
A guide to cybersecurity metrics and KPIs
Cybersecurity metrics are types of data a business tracks on a regular basis. Not only does this data help organisations make key decisions but also provides a basis for bolstering overall cybersecurity measures. Cybersecurity teams should have a set of metrics that they track regularly, some companies even track them daily. Utilising the proper cybersecurity metrics and key performance indicators (KPIs) … Read More
Remediated vs mitigated – know the difference
You’ll hear the mentions of remediation and mitigation a lot in cybersecurity. They are terms often used interchangeably but there is a distinct difference between the two. Both play a key role in cybersecurity service providers’ risk-related decision-making. With that in mind, let’s take a closer look at remediated vs mitigated vulnerabilities so that you are aware of the fundamental … Read More
What is cyber risk modeling
As malicious actors continue refining their attack methods, the average cost of a data breach is rising. Consequently, companies must devise cyber risk mitigation strategies and implement the required security controls to better protect their networks and infrastructure with an appropriate sense of urgency. Unfortunately, the technical nature of cyber security means that IT personnel often have difficulty accurately conveying … Read More
What is an IT security gap?
An IT security gap is a vulnerability that malicious actors can exploit in a company’s cyber security defences. Gaps in IT security represent the difference between a company’s current cyber security posture and their desired (or, in many cases, to achieve compliance, required) implementation of security policies and controls. Let’s look at some of the most common IT security gaps … Read More