How to avoid a baiting attack

How to avoid a baiting attack

Social engineering attacks are one of the most significant threats to an organisation’s information security. So much so that a staggering 98% of cyberattacks involve some social engineering component. One of the social attacks favoured by cybercriminals is known as baiting.   In this article, we look at baiting attacks and how to avoid them.  What is a Baiting Attack?  Baiting … Read More

How to choose a cybersecurity framework that works for you

How to choose a cybersecurity framework that works for you

A cybersecurity framework provides security teams with a set of standards and a common language across borders and industries to understand security postures. With a cybersecurity framework in place, it can help define the procedures and processes that your organisation must take to monitor, asses and mitigate cybersecurity risk.  Let’s take a closer look at the most common cybersecurity frameworks.  … Read More

How to prevent a pharming attack

How to prevent a pharming attack

A recent study has revealed that 88% of organisations worldwide have suffered a DNS attack in the past year. More alarmingly, each organisation experienced seven attacks on average – at $942,000 (£836,000) per attack. One of the most common forms of attack on DNS servers is known as pharming.   Let’s explore what a pharming attack is, how they occur, … Read More

How can you avoid downloading malicious code?

How can you avoid downloading malicious code?

Most cyber threats, whether designed to steal data or extract money from a user, have malicious code at their core. Once this malicious code finds its way onto a device, it can be devastating: particularly if it first infects one machine before spreading through an organisation’s network.   Worse, the more sophisticated the malicious code, the harder it is to remove. … Read More

How to prevent ransomware attacks?

How to prevent ransomware

Ransomware attacks have increased dramatically over recent years, so much so that the 2022 cost of attacks is estimated to top US$20 billion globally.   Ransomware can cause widespread damage, but at the same time, they can be entirely preventable. The willingness to invest in even the most basic cybersecurity measures will not only protect valuable assets but could save organisations … Read More

Digital Supply Chain – what is it, and how do you protect it?

Digital supply chain

New technologies enable businesses to provide the platform for a thoroughly modern supply chain – the digital supply chain. A digital supply chain includes the process of delivering a digital asset from the point of origin to its destination. In today’s technological world, a digital supply chain spans the entire operations of most organisations.   A digital supply chain utilises advanced technologies … Read More

Understand cloud computing vulnerabilities endangering your data 

understand cloud computing vulnerabilities

Cloud computing vulnerabilities basics When discussing cloud vulnerabilities, it’s important to define indicators based on clear and concise definitions of risk factors concerning cloud computing. Cloud computing security has never been as crucial as it is now. Not only are the risks and threats vast, but in many cases, the security itself is cited as the main stumbling block for … Read More

What is DNS Hijacking and How to Detect It

What is DNS Hijacking

What is DNS hijacking? DNS hijacking, also referred to as DNS redirection, is a type of cyber attack that sees hackers intercept a user’s DNS queries and redirects them to malicious websites. The role of a DNS (Domain Name System) server is to translate the URL, or domain name, that the user enters into their browser, into an IP address so they … Read More

Open source security software risks

Open source security

What is open source security? Open source software security is the measure of assurance in the freedom from the risk inherent to an open source software system. Open source security refers to the processes and tools used to manage and secure compliance and OSS from development to production. These tools can automatically discover open source dependencies within applications, provide valuable … Read More