What is DNS hijacking? DNS hijacking, also referred to as DNS redirection, is a type of cyber attack that sees hackers intercept a user’s DNS queries and redirects them to malicious websites. The role of a DNS (Domain Name System) server is to translate the URL, or domain name, that the user enters into their browser, into an IP address so they … Read More
Definition of impersonation – online safety
Definition of impersonation Online impersonation is when a malicious actor steals someone’s online identity in order to cause damage – financial or reputational, or by intimidating, harassing, or threatening their victim. They can come in the guise of a disgruntled partner, former colleague, an enemy you’ve made along the way or by someone you don’t even know who wishes to … Read More
What are the cloud security challenges in 2022?
Taking a closer look at the main cloud security challenges, issues and threats found in 2022 As organisations right around the world switch their operations over to cloud computing, the security implications that come with it intensify. IT teams are now locked in a race to come up with the latest and best cloud security solutions to ensure that their organisations … Read More
What is the real cost of a data breach?
Cyberattacks are on the rise. Hackers are well-funded, better organised, and more sophisticated in their methods. Not only are they causing millions of dollars’ worth of damage to businesses around the world but are reaping the rewards of a rather lucrative hacking enterprise. Security teams are doing everything they can to prevent their companies from falling under attack, but malicious … Read More
Phishing emails & ways to prevent spear phishing
What is spear phishing? Spear phishing is defined as the fraudulent practice of sending emails ostensibly from a known or trusted sender to induce targeted individuals to reveal confidential information. As the name would suggest, spear phishing is a type of phishing attack targeted at a small group or individual. Whereas phishing attacks are broad and apply to many people, … Read More
How to define sensitive data and the means of protecting it
What is sensitive data, how do you define it and how to protect it A report revealed that in 2021, sensitive data was the most common target in data breaches. For example, 65% of all sensitive data incidents involve social security numbers (SSN), and 41% of incidents to personal health information because they are valuable targets. Moreover, most data breaches occur … Read More
Top 3 Ransomware Examples and what can we learn from them
Ransomware attacks have become a significant threat to businesses worldwide. As organisations adopt remote working models to accommodate WFH, they expose networks to ransomware, creating devastating losses that undermine their reputations. In fact, the past year has seen ransomware attacks take down massive corporations with sophisticated networks. We will explore some ransomware examples and explain what to do to prevent such … Read More
Understanding the cyber risks of the LDAP protocol
The Lightweight Directory Access Protocol (LDAP protocol) is an open, vendor-neutral, industry-standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network. LDAP is a client-based lightweight version of Directory Access Protocol (DAP). It operates on both private intranets and public networks, and across multiple directory services which makes it the most convenient for authenticating, … Read More
How to protect personally identifiable information from a cyber breach
In recent years, personally identifiable information (PII) such as social security numbers, medical history, and banking details have become a high priority target for cybercriminals. For example, There were 1.4 million reported ID theft incidents in 2020, as opposed to 650,000 incidents in 2019. Driven by the prospect of high prices on the dark web and security vulnerabilities prevalent in … Read More