Cybersecurity Awareness Month 2022 – All you need to know

Cybersecurity Awareness Month 2022

October has been declared Cybersecurity Awareness Month 2022 by the President of the United States and Congress. Since 2004, the initiative has been in place to help individuals protect themselves online as threats to technology and confidential data become more commonplace.   The National Cybersecurity Alliance (NCA) and the Cybersecurity and Infrastructure Security Agency (CISA) have this year led a collaborative … Read More

How can you avoid downloading malicious code?

How can you avoid downloading malicious code?

Most cyber threats, whether designed to steal data or extract money from a user, have malicious code at their core. Once this malicious code finds its way onto a device, it can be devastating: particularly if it first infects one machine before spreading through an organisation’s network.   Worse, the more sophisticated the malicious code, the harder it is to remove. … Read More

Utility Sector Cybersecurity Risks — And What Can Be Done About Them 

Utilities cybersecurity

An increasingly dangerous cyber threat landscape poses a risk to critical national infrastructure, particularly in the utility sector. Any kind of large-scale disruptive attack will cause a massive impact on government and corporate systems. Just last year, a double-extortion ransomware attack on Colonial Pipeline, a private fuel provider servicing the East Coast, caused a shutdown of its pipeline operation and IT systems. … Read More

Open source security software risks

Open source security

What is open source security? Open source software security is the measure of assurance in the freedom from the risk inherent to an open source software system. Open source security refers to the processes and tools used to manage and secure compliance and OSS from development to production. These tools can automatically discover open source dependencies within applications, provide valuable … Read More

Definition of impersonation – online safety

definition of impersonation online

Definition of impersonation Online impersonation is when a malicious actor steals someone’s online identity in order to cause damage – financial or reputational, or by intimidating, harassing, or threatening their victim. They can come in the guise of a disgruntled partner, former colleague, an enemy you’ve made along the way or by someone you don’t even know who wishes to … Read More

What is the real cost of a data breach? 

What is the real cost of data breach? 

Cyberattacks are on the rise. Hackers are well-funded, better organised, and more sophisticated in their methods. Not only are they causing millions of dollars’ worth of damage to businesses around the world but are reaping the rewards of a rather lucrative hacking enterprise.   Security teams are doing everything they can to prevent their companies from falling under attack, but malicious … Read More

Who is targeted by ransomware? 

Who is targeted by ransomware

Ransomware is now commonplace within many industries around the world. Over the past three years, especially during the pandemic, ransomware attacks have increased in many different sectors including government, healthcare, education, professional services, and manufacturing.  According to the FBI’s Internet Crime Report 2021, America experienced an unprecedented increase in cyber-attacks and malicious cyber activity during 2021. These cyber-attacks compromised businesses … Read More

Why use compliance monitoring as a part of your cybersecurity program? 

Use compliance monitoring as a part of your cybersecurity program

Compliance monitoring is a key part of any cybersecurity program. It is a continuous process used to ensure staff are following procedures and policies put in place to protect company assets. Regulatory compliance monitoring is key to spotting potential issues in any organisation’s function or operations. However, it is now becoming extremely difficult for companies around the world to meet their regulatory … Read More

What is a common indicator of a phishing attempt?

What is a common indicator of a phishing attempt

A phishing attack is a social engineering method where an attacker sends a fraudulent email or message designed to trick a person into revealing private or personal information. Another method could see a hacker deploy malicious software onto a victim’s infrastructure, such as ransomware. But the burning question you might ask is, what is a common indicator of a phishing attempt? … Read More