Ransomware Attack On Water Utility & Ways To Thwart/Minimize Attack Damage

In response to reports by the AP and other news outlets that Feds investigate after hackers attack water utility, an expert with STEALTHbits Technologies offers advice to avoid similar ransomware attacks or minimize their impacts. Adam Laub, Senior VP, Product Marketing at STEALTHbits Technologies, Inc. “Ransomware has made big headlines for the past few years and will continue to […]

(ISC)2 Report Finds Cybersecurity Workforce Gap Has Increased To More Than 2.9 Million Globally

Despite 59% of cybersecurity professionals saying the widening workforce gap puts their organizations at risk, a majority of workers report strong job satisfaction and are focused on developing new skills (ISC)² – the world’s largest nonprofit association of certified cybersecurity professionals – today announced the findings of the 2018 (ISC)2 Cybersecurity Workforce Study. The research shows a widening […]

How To Avoid An Insider Threat Nightmare

Halloween Hackers after more than just Candy

David Higgins, CyberArk offers his tips and recommendations to mitigate insider threat this Halloween… As Halloween looms, it would certainly feel like the right time to think of our favourite horror stories. From an enterprise IT perspective, there are too many to keep up with these days. From the constant threat of cyber attacks from […]

UK Faces 10 Cyberattacks A Week

In response to the report from NCSC which says that the UK has faced ten cyberattacks per week for the last two years, please see below comments from IT security experts. Adam Bacchus, Director of Program Operations at HackerOne: “Brexit may exacerbate the growing talent gap within the field of information security, and potentially reduce […]

A Layer Of Protection From The Outside World

An unfortunate truth in business is that any worker, in any organisation, can be the target of a cyberattack. There are a wide range of considerations that IT security managers must take into account so that they can identify what makes their organisation vulnerable to highly-sophisticated cybercriminals – including the employees, endpoints across the organization, […]

35 Million Voter Records From 20 States For Sale On The Dark Web

News has broken that an advertisement on a forum that sells data breach information is also offering the personally identifiable details and voting history of millions of US residents. The estimated size of the cache is in excess of 35 million records. The announcement says that the data sold is from updated state-wide voter lists, and includes millions […]

Outstanding Features of Expanded Password System

Password Security Policy Template

People who enjoy handling images will gain better security and convenience.  The only extra effort required is to get the images registered. But people already do that across social media platforms and seem to love it. So far, only texts have been accepted.  It was, as it were, we have no choice but to walk […]