RiskXchange can help your company avoid becoming one of those affected by costly cyberattacks and ensure your organisation doesn’t make our list of top data breaches.. Cybercriminals flourished in 2021, which is, of course, bad news for businesses right around the globe. The Identity Theft Resource Center (ITCR) reported that by the end of September last year, the number of … Read More
How can you protect your operations from a domain hijacking attack?
In 2014, the owner of the website domain MLA.com lost all their traffic and transactions overnight because its domain name was hijacked and all visitors were redirected to a fabricated website. In addition to lost traffic, they also lost all administrative access to the website—next to nothing could be done to resolve the issue. While the owner eventually recovered access, … Read More
What is a zero trust security model?
RiskXchange comes up with innovative solutions to everyday problems experienced at the hands of hackers. Principal Analyst of Forrester Research, John Kindervag founded the zero trust security model in 2010. The model, also known as perimeterless security, describes an approach to the design and implementation of IT systems. The zero trust concept is based around “never trust, always verify,” which means devices should … Read More
What is an attack vector and how can you avoid it?
RiskXchange generates objective and quantitative reporting on a company’s cyber security risk and performance. Cybercrime is ever evolving, and hackers are changing their tactics daily. Malware is commonplace but ransomware is the biggest threat to organisations in 2021. Some attack vectors – like phishing and credential theft – have been around for quite some time while others have cropped up in recent years causing widespread damage. What is an attack … Read More
What we can learn from the Codecov breach case
None of us are strangers to news of cyberattacks and security incidents that have financially staggering repercussions and those that cause significant reputational damage. Recently, however, news of Codecov breach, a supply chain attack, one that remained undetected for months until it was far too late — represents a dangerous turn in the recent spate of attacks that includes the … Read More
Rethinking data privacy in the new normal
Data privacy is a raging topic of discussion both on a corporate level and on a personal level. It’s difficult to believe that any organisation operating in the current market has not thought about data security and protection measures—even the smallest entity. Despite the knowledge we hold about the vulnerability of our data and how it can be used, however, … Read More