Experts On: American Hospitals Turning Patients Away Due To Ransowmare Attack

It has been reported that three US hospitals have been forced to temporarily close their doors to “all but the most critical new patients” following a ransomware outbreak. This incident was first reported on 1 October with computers at the DCH Regional Medical Center in Tuscaloosa, Fayette Medical Center and Northport Medical Center all infected with […]

Security vs. Convenience: Delivering Seamless, Secure Service Experiences

Customer identity is a precious asset and a highly prized commodity. As the financial services industry has become more digitised down the years, customers’ digital identity decides what they can do and what online services they have access to. This has been revolutionary for the customer experience. So long as the service provider is happy […]

Expert Comments: A Flaw In Webex And Zoom Let Researchers Snoop On Users’ Video Calls

It has been reported that a team of security researchers found they could tap into Webex and Zoom video meetings because many weren’t protected with a code. Researchers programmed a bot to cycle through lists of valid meeting IDs and get access to active conference calls. The vulnerability works because many companies and users don’t protect their meetings […]

Comments On Google’s Expanding Privacy And Security Features

Google has announced it is expanding new privacy and security features for Youtube, Maps and its Assistant. The new features allow users to use incognito mode in more properties, monitor saved passwords for compromises and manages how consumer data is used on YouTube.

Why Cybersecurity Programs Shown To Have Tangible Value In M&A Assessments

Earlier this week, (ISC)² – the world’s largest non-profit association of certified cybersecurity professionals – released the findings from its Cybersecurity Assessments in Mergers and Acquisitions report, which surveyed 250 U.S.-based professionals with mergers and acquisitions (M&A) expertise. The goal of the study was to discover how cybersecurity programs and breach history factor into the dollars and cents […]