Types of cybercrime and how to protect yourself from each 

Types of cybercrime

Instances of cybercrime are climbing – costing organisations trillions of dollars annually. Worse still, the more society relies on technology and digital solutions, the larger the attack surface for cybercriminals to exploit. This means that it’s vital for organisations to maintain an awareness of the different types of cybercrime they’re susceptible to so they can implement the optimal cybersecurity infrastructure … Read More

Types of threat actors and dangers of each one

Types of threat actors

For your organisation to implement the optimal information security infrastructure, controls, and policies, it not only has to account for the various cyberattacks it faces but the types of threat actors who could carry them out too, to avoid costly breaches.   Let’s get a closer look into different threat actors types and discover how dangerous each of them is. Threat … Read More

How to avoid a baiting attack

How to avoid a baiting attack

Social engineering attacks are one of the most significant threats to an organisation’s information security. So much so that a staggering 98% of cyberattacks involve some social engineering component. One of the social attacks favoured by cybercriminals is known as baiting.   In this article, we look at baiting attacks and how to avoid them.  What is a Baiting Attack?  Baiting … Read More

How to protect yourself from a cyber threat

Cyber threat

Cybersecurity or cyber threat is an intentional act designed to steal data, damage data or disrupt daily digital life. Cyber threats can range anywhere from data breaches or viruses to Denial of Service (DoS) attacks and other kinds of attacks.   Cyber threats can refer to cyberattacks that have caused widespread disruption, damage or destruction. They can also be classed as those that allow hackers … Read More

Log4j zero day vulnerability: How to protect yourself

Log4j zero day vulnerability

The Log4j zero day vulnerability (CVE-2021-44228) is a remote code execution (RCE) vulnerability that allows malicious actors to take complete control of vulnerable devices and execute arbitrary code.  The Log4j 0-day vulnerability has to date, been detected in more than 3 million vulnerable instances. Researchers also found that nearly 68,000 vulnerabilities were present in cloud workloads and containers within the … Read More

Importance of continuous control monitoring (CCM)

Importance of continuous control monitoring (CCM)

What is continuous control monitoring? Continuous control monitoring (CCM) is defined as using a set of technologies to reduce company losses through continuous monitoring. It also reduces the cost of audits via the continuous auditing of controls in financial applications and other types of applications.  In the overall business ecosystem, CCM sits above your existing security tooling, ensuring that all assets … Read More

All you need to know about leveraging a cybersecurity risk taxonomy 

leveraging cybersecurity risk taxonomy

What is cyber risk taxonomy? A cybersecurity risk taxonomy is a tool that can identify risk vectors facing your organisation. Using the insights gained, it allows security teams to communicate cyber risk to the board of directors, implement the right protections and advocate for resources.  Creating a cybersecurity risk taxonomy generates specific areas or groups which enable the technical management … Read More

Mitigating cyberattacks with IOAs and IOCs

Paper with Indicator of Attack (IOAs) and Indicator of Compromise (IOCs)

IOA and IOC – what’s the difference and why you should pay attention to them Being able to mitigate cyberattacks is key to business success in today’s digital age. Indicator of Attack (IOAs) and Indicator of Compromise (IOCs) are two important parts of ensuring your network is safe and secure.   IOAs demonstrate the intentions behind a cyberattack and the techniques … Read More

The Rise of Ransomware as a Service

The Rise of Ransomware as a Service

Ransomware as a service – what is it and how to prevent it? Ransomware attacks have more than doubled in the last 12-months alone. It’s a scary statistic that sends shudders down the spines of security teams around the world who are constantly battling cyber threats. But just why has ransomware become the weapon of choice for cyber attackers? The … Read More