Digital innovation offers companies several advantages, ranging from greater profitability and lower costs to increased employee productivity and the ability to provide better customer service. That said, more digital solutions increase the size of an organisation’s attack surface – giving cybercriminals more options for breaching their IT infrastructure and compromising sensitive data and assets. In light of this, it’s not … Read More
What is scareware?
What is scareware? Scareware is a type of malware cyberattack that scares a person into visiting an infected site and downloading malicious software. Scareware works by claiming to have detected an issue or virus on a device and directs the user to buy or download malicious software to rectify the problem. Scareware is basically the gateway to a more sophisticated … Read More
What is mobile malware?
Mobile malware is designed to target mobile devices, such as smartphones and tablets, with the aim of accessing private data. Mobile malware is a growing threat to organisations of any size because many businesses now allow their employees to access corporate networks using their own devices. Not only does this increase the potential for bringing unknown threats into the company … Read More
What’s the difference between opportunistic & targeted attacks?
There are two main types of cyberattack: opportunistic attacks and targeted attacks. Targeted attacks are when a cybercriminal has a specific target in mind whereas an opportunistic attack is when the attack is random. So, how do targeted attacks differ from common opportunistic attacks? The difference between targeted and opportunistic attacks depends on what the attacker wants and how they … Read More
CIS Critical Security Controls for Effective Cyber Defense: What are They?
Established in 2000, the Centre of Internet Security (CIS) is a global, non-profit community of experts that collectively develops tools, solutions, and best practices for increasing cyber security and mitigating cyber risk. As well as being renowned for their Benchmarks, which are used to reduce configuration-based vulnerabilities in digital assets, they have developed a cyber risk mitigation framework called the … Read More
Reactive vs proactive cyber security: Which is better?
Between ever-growing numbers of digital solutions taking our data online and cybercriminals refining their methods, the number of cyber attacks organisations suffer is consistently on the rise. In fact, studies have revealed that ethical hackers discovered over 65,000 vulnerabilities in 2022 – an increase of over 20% over the previous year. With malicious actors becoming both more active and dangerous, … Read More
What are the Risks of Emerging Technologies in Cyber Security?
Technological advancements help push society forward, making our lives safer and more convenient while increasing our overall quality of life. In some cases, new technology saves lives: allowing us to grow better quality food in higher quantities, make water drinkable, and cure diseases. However, emerging technologies in cyber security are a double-edged sword as they come with new cyber threats. … Read More
Risk Mitigation Strategies for Cybersecurity
As technology evolves, more innovative digital solutions emerge, and more of our data finds its way online, an increase in the number of cyber threats is inevitable. Worse still, as cyber attacks increase in sophistication and severity – as well as in number – it becomes more difficult and less feasible for organisations to address each threat as it arises. … Read More
Examples of Real-Life Data Breaches Caused by Insider Threats
In organisations of all sizes, there are often a large number of employees that know the ins and outs of a company’s cybersecurity tools and infrastructure. This is the reason behind thousands of inadvertent and malicious insider attacks conducted around the world each month which can lead to real threat data breaches and substantial financial losses. Insider threats can cause … Read More