Information Security Buzz
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Top Posts
15 Schools Hit By Cyberattack In Nottinghamshire
Qualys Hit With Ransomware And Customer Invoices Leaked
Experts Reaction On PrismHR Hit By Ransomware Attack
Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is...
ObliqueRAT Trojan Lurks On Compromised Websites – Experts...
Microsoft Multiple 0-Day Attack – Tenable Comment
Experts Reaction On Malaysia Airlines 9 Years Old...
IoT Security In The Spotlight, As Research Highlights...
Oxfam Australia Confirms ‘Supporter’ Data Accessed In Cyber...
Expert Reaction On Solarwinds Blames Intern For Weak...
Information Security Buzz
Connecting Security Experts
  • HOME
  • Domains
    • Data Breach
    • Malware
    • Application Security
    • IoT
    • Cloud Security
    • Privacy
  • InfoSec Deals
  • Companies
  • Security Experts
  • ISB Conference 2021
  • Register
  • Log In
Expert(s): November 30, 2020
Adam Bangle
VP EMEA feature_status*/ ?>
BlackBerry

Comments Dotted : 6
February 22, 2021

Experts Insight On ‘Silent Stealing’ New Cyber Crime Phenomenon

We must prevent cybercriminals getting hold of the data which allows them to carry out silent fraud.

Cybercriminals exploit confusion and uncertainty. The pandemic has been a case in point with a huge rise in scams and new approaches to exploiting the general public. ‘Silent stealing’ tactics, including unauthorised access to accounts and low level anomalous activity in paystreams are on the rise. But the success of these scams needn’t be inevitable.



We know the scams and hacks are coming, so we must all understand what is at stake. Personal data is worth more than ever – bank details,

.....Read More

Cybercriminals exploit confusion and uncertainty. The pandemic has been a case in point with a huge rise in scams and new approaches to exploiting the general public. ‘Silent stealing’ tactics, including unauthorised access to accounts and low level anomalous activity in paystreams are on the rise. But the success of these scams needn’t be inevitable.



We know the scams and hacks are coming, so we must all understand what is at stake. Personal data is worth more than ever – bank details, passwords, even shopping basket history, and it can be used in many ways to steal money from bank accounts.  

 

We must prevent cybercriminals getting hold of the data which allows them to carry out silent fraud. On an individual level, weak passwords and human error – including trusting emails about your order or calls from your bank – will let the hackers in. Organisations that hold customer data also have the responsibility to deploy fully up-to-date cybersecurity that tracks and defends against new threats created by those looking to steal this data. Together, we must all make the job of cyber attackers as difficult as possible. How? By improving cyber hygiene through constant vigilance and exercising zero trust.

  Read Less
Like(0)  (0)

Linkedin Message

@Adam Bangle, VP EMEA , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"We must prevent cybercriminals getting hold of the data which allows them to carry out silent fraud...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-silent-stealing-new-cyber-crime-phenomenon

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Adam Bangle, VP EMEA , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"We must prevent cybercriminals getting hold of the data which allows them to carry out silent fraud...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-insight-on-silent-stealing-new-cyber-crime-phenomenon

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
January 08, 2021

Experts Reacted On Hackney Council Leaked Documents

Cybercriminals exploit confusion and uncertainty.

Cybercriminals exploit confusion and uncertainty. The pandemic has been a case in point with a huge rise in scams, and during this new lockdown we can expect to see more cyber-attacks like this. While these cyber-attacks are inevitable, their success needn’t be.

 

We know the scams and hacks are coming. Institutions, their employees, and other stakeholders must understand what is at stake: personal data is worth more than ever on the dark web – bank details, passwords, and much more. A lack

.....Read More

Cybercriminals exploit confusion and uncertainty. The pandemic has been a case in point with a huge rise in scams, and during this new lockdown we can expect to see more cyber-attacks like this. While these cyber-attacks are inevitable, their success needn’t be.

 

We know the scams and hacks are coming. Institutions, their employees, and other stakeholders must understand what is at stake: personal data is worth more than ever on the dark web – bank details, passwords, and much more. A lack of cybersecurity solutions in place will let the hackers in. 

 

Councils and other state institutions have a responsibility to deploy fully up-to-date cybersecurity that tracks and defends against new threats. But employees and other stakeholders also have a role to play: making the job of cyber attackers as difficult as possible. How? By improving their cyber hygiene through constant vigilance and exercising zero trust.

  Read Less
Like(0)  (0)

Linkedin Message

@Adam Bangle, VP EMEA , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Cybercriminals exploit confusion and uncertainty...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reacted-on-hackney-council-leaked-documents

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Adam Bangle, VP EMEA , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Cybercriminals exploit confusion and uncertainty...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/experts-reacted-on-hackney-council-leaked-documents

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
December 07, 2020

Expert Advise On How To Protect From Cybercrime Coming This Christmas

The pandemic has been a case in point with a huge rise in scams.
The harsh truth is that cyber attackers don’t care that Christmas is a welcome relief for many this year. As the pandemic continues, and online shopping becomes a necessity for many, it’s clear that hardworking retailers and their customers cannot drop their guard – no matter the turmoil they’ve been through this year. Cybercriminals exploit confusion and uncertainty. The pandemic has been a case in point with a huge rise in scams. This festive season, we can expect unauthorised access .....Read More
The harsh truth is that cyber attackers don’t care that Christmas is a welcome relief for many this year. As the pandemic continues, and online shopping becomes a necessity for many, it’s clear that hardworking retailers and their customers cannot drop their guard – no matter the turmoil they’ve been through this year. Cybercriminals exploit confusion and uncertainty. The pandemic has been a case in point with a huge rise in scams. This festive season, we can expect unauthorised access to accounts, phishing emails, suspicious phone calls, anomalous activity in paystreams. These cyber attacks are inevitable – but their success needn’t be. We know the scams and hacks are coming. Retailers and their customers must understand what is at stake: personal data is worth more than ever on the dark web – bank details, passwords, even shopping basket history. They need to know that weak passwords and human error – including trusting emails about your order or calls from your bank – will let the hackers in. Retailers have the responsibility to deploy fully up-to-date cybersecurity that tracks and defends against new threats. But consumers also have a role to play: making the job of cyber attackers as difficult as possible. How? By improving their cyber hygiene through strong two-factor authentication, constant vigilance and exercising zero trust.  Read Less
Like(0)  (0)

Linkedin Message

@Adam Bangle, VP EMEA , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The pandemic has been a case in point with a huge rise in scams...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-advise-on-how-to-protect-from-cybercrime-coming-this-christmas

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Adam Bangle, VP EMEA , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"The pandemic has been a case in point with a huge rise in scams...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-advise-on-how-to-protect-from-cybercrime-coming-this-christmas

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
December 04, 2020

Data Protection Is Integral In Wake Of COVID-19 Vaccine ‘Cold Supply’ Chain Network Hack

For the organisations taking part in distribution of COVID-19 vaccines, leveraging a third party to manage data protection is likely wise.
With the country on tenterhooks preparing for the imminent roll-out of the COVID-19 vaccines, it was inevitable that contributing organisations would be targeted by cyber criminals. But what typically differentiates these sophisticated nation-state level groups from more amateur organisations, is their taking the attack surface provided to them and their ability to find a way in, even if there are no known vulnerabilities. Externally exposed services and devices are targets that are often.....Read More
With the country on tenterhooks preparing for the imminent roll-out of the COVID-19 vaccines, it was inevitable that contributing organisations would be targeted by cyber criminals. But what typically differentiates these sophisticated nation-state level groups from more amateur organisations, is their taking the attack surface provided to them and their ability to find a way in, even if there are no known vulnerabilities. Externally exposed services and devices are targets that are often desirable as well as the ever-prominent phishing email. For the organisations taking part in distribution of COVID-19 vaccines, leveraging a third party to manage data protection is likely wise. Many government entities and affiliate organisations suffer from a lack of resources that allow them to adequately protect their assets and data. This is not an excuse, but a realisation that needs to be understood so the problem can be appropriately addressed. From a privacy perspective it is apparent that centralisation of data is necessary to achieve a full vaccine roll-out and other solutions to COVID, at least in the near term. If you’re unable to manage the systems and security themselves, outsource this function to a skilled third party. This comes with its own risks but is significantly better than the alternative – a compromised operation with costly implications.  Read Less
Like(0)  (0)

Linkedin Message

@Adam Bangle, VP EMEA , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"For the organisations taking part in distribution of COVID-19 vaccines, leveraging a third party to manage data protection is likely wise...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/data-protection-is-integral-in-wake-of-covid-19-vaccine-cold-supply-chain-network-hack

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Adam Bangle, VP EMEA , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"For the organisations taking part in distribution of COVID-19 vaccines, leveraging a third party to manage data protection is likely wise...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/data-protection-is-integral-in-wake-of-covid-19-vaccine-cold-supply-chain-network-hack

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
November 28, 2020

Black Friday – IoT Devices Bought Today Are Far Riskier Than Consumers Think

Cyber criminals are waiting for organisations and the public to drop their guard.
Anything with an Internet address can and will be attacked. We’ve certainly witnessed this happening on a large scale with the proliferation of Internet of things (IoT) devices in recent years, and we’re likely to see the magnitude and complexity of these attacks escalate in the years ahead, as the IoT grows to 67 billion new connected devices by 2025. The IoT is a misunderstood risk. Securing everything means just that: every ‘thing’ must have secure endpoint protection, or else it.....Read More
Anything with an Internet address can and will be attacked. We’ve certainly witnessed this happening on a large scale with the proliferation of Internet of things (IoT) devices in recent years, and we’re likely to see the magnitude and complexity of these attacks escalate in the years ahead, as the IoT grows to 67 billion new connected devices by 2025. The IoT is a misunderstood risk. Securing everything means just that: every ‘thing’ must have secure endpoint protection, or else it can be used as a doorway to entire networks, threatening safety, privacy and data. One concerning case last year saw cyber attackers take over a family’s smart home devices to blast music at loud volumes, talk to the couple through a camera in their kitchen, and crank their thermostat to 90 degrees. The onus should first fall upon IoT manufacturers to secure their devices. But this doesn’t mean the consumer and the enterprise shouldn’t exercise their own cyber hygiene: awareness of what is at risk, usage of secure passwords and multi-factor authentication, and finally an attitude of zero-trust. Before deploying any powerful technology or artificial intelligence, we must learn to anticipate the threat, recognise the value of IoT systems to cyber attackers, and prepare to respond to any sign of unauthorised hackers. Cyber criminals are waiting for organisations and the public to drop their guard. We must not let them seize the opportunity.  Read Less
Like(0)  (0)

Linkedin Message

@Adam Bangle, VP EMEA , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Cyber criminals are waiting for organisations and the public to drop their guard...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/black-friday-iot-devices-bought-today-are-far-riskier-than-consumers-think

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Adam Bangle, VP EMEA , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Cyber criminals are waiting for organisations and the public to drop their guard...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/black-friday-iot-devices-bought-today-are-far-riskier-than-consumers-think

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.
October 27, 2020

Psychotherapy Clinic Data Breach – No Data Is Safe

No data is safe, no matter how sensitive.
No data is safe, no matter how sensitive. As the price of personal data climbs on the dark web, the recent security breach at private Finnish psychotherapy centre, Vastaamo, is further testament to the fact that cybercriminals will leave no stone unturned on their hunt for ransom-worthy personal details. With up to tens of thousands of clients now concerned about the availability of their sensitive, personal data on the dark web, this is one of most disturbing examples of gross misuse of.....Read More
No data is safe, no matter how sensitive. As the price of personal data climbs on the dark web, the recent security breach at private Finnish psychotherapy centre, Vastaamo, is further testament to the fact that cybercriminals will leave no stone unturned on their hunt for ransom-worthy personal details. With up to tens of thousands of clients now concerned about the availability of their sensitive, personal data on the dark web, this is one of most disturbing examples of gross misuse of patient records in recent history. The healthcare industry appeals to hackers due to the nature of the data it handles, the amount of Internet of things (IoT) devices collecting sensitive data, the continued use of insecure, legacy devices and the fact that IT and security teams in the health sector lack the resources to deal with the modern threat landscape. Sadly, ransomware and information stealers are the most common type of malware used against the healthcare sector. BlackBerry’s 2020 Threat Report uncovered that globally, healthcare organisations are more likely to pay ransoms than any other industry due to the critical nature of the targeted data. We are all cautious about our personal information, and rightfully so. This breach should serve as an important reminder to healthcare organisations everywhere that service users place a great deal of trust in their practitioner, and this shouldn’t be taken lightly. Companies which are not deploying fully up to date cybersecurity that tracks and defends against new threats are playing with fire, and in the world of healthcare this is too great a risk.  Read Less
Like(0)  (0)

Linkedin Message

@Adam Bangle, VP EMEA , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"No data is safe, no matter how sensitive. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/psychotherapy-clinic-data-breach-no-data-is-safe

Copy this message and share on your Linkedin profile. Thanks!

Facebook Message

@Adam Bangle, VP EMEA , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"No data is safe, no matter how sensitive. ..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/psychotherapy-clinic-data-breach-no-data-is-safe

Copy this message and share on your Facebook profile. Thanks!
    No Comments Yet ....
Please login to comment.

SECURELY DOTTED BY

Stephen Kapp, CTO and Founder, Cortex Insight

"Updating and patching systems should be a priority for schools and mandatory for their pupils. "

15 Schools Hit By Cyberattack In Nottinghamshire

Jake Moore, Cybersecurity Specialist, ESET

"In general, malicious actors now use full-blown extortion tactics to make sure they get what they came for in attacks like this. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Ilia Kolochenko, CEO, ImmuniWeb

"Qualys’s response to the incident is a laudable example of transparent and professional handling of a security incident. "

Qualys Hit With Ransomware And Customer Invoices Leaked

Natalie Page, Cyber Threat Intelligence Analyst, Sy4 Security

"Due to the nature of this organisation, PrismHR makes for an extremely valuable target to an adversary looking to extract sensitive information. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Lewis Jones, Threat Intelligence Analyst, Talion

"Ransomware renders any files it touches unreadable unless, and until, a victim pays for a digital key needed to unlock the encryption on them. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Stephen Kapp, CTO and Founder, Cortex Insight

"An attack like this will not only impact PrismHR but also its customers who will need access to systems in order to pay employees. "

Experts Reaction On PrismHR Hit By Ransomware Attack

Richard Walters, CTO , Censornet

"“Careless clicks sink ships.” "

Expert Insight On Ryuk’s Revenge: Infamous Ransomware Is Back And Stronger Than Ever

Saryu Nayyar, CEO, Gurucul

"The evolution of the ObliqueRAT trojan is a good example of how malicious actors are constantly updating their tools and techniques. "

ObliqueRAT Trojan Lurks On Compromised Websites – Experts Comments

James McQuiggan, Security Awareness Advocate, KnowBe4

"It is essential to conduct red team or pen testing exercises. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Nikos Mantas, Incident Response Expert, Obrela Security Industries

"Data security should be a priority for all organisations today. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

David Sygula, Senior Cybersecurity Analyst , CybelAngel

"Organisations must constantly scan for leaked documents outside the enterprise perimeter. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Satnam Narang, Senior Research Engineer, Tenable

"We expect other threat actors to begin leveraging these vulnerabilities in the coming days and weeks. "

Microsoft Multiple 0-Day Attack – Tenable Comment

Sam Curry, Chief Security Officer, Cybereason

"Total transparency is needed and they need to hone in on more specific details and be completely transparent with Enrich members. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Florian Thurmann, Technical Director, EMEA , Synopsys Software Integrity Group

"Your organisation won’t be able to determine which of their employees has made a given change in the system. "

Experts Reaction On Malaysia Airlines 9 Years Old Data Breach

Alan Grau, VP of IoT , Sectigo

"Best-practices for IoT device security include strong authentication and secure software updates. "

IoT Security In The Spotlight, As Research Highlights Alexa Security Flaws

WORKING WITH US

About Us

Advertise With Us

Information Security Companies

Contact Us

ISB CONFERENCE

ISB Conference 2021

THE PAGES

Privacy Policy

Terms & Conditions

RSS Feeds

INFORMATION SECURITY EXPERTS

Information Security Experts: Comments Dotted

Register and Comments

Categories

  • Facebook
  • Twitter

Copyright © 2020 ISBuzz Pty Ltd is a company registered in Australia with company number 605 203 772 whose registered office is 14 Alanvale Street, Harrison, ACT 2914.


Back To Top
Information Security Buzz
  • Home
  • Experts Comments on News
  • Security Articles
  • Vendor News
  • Study & Research
  • ISBuzz Expert Panel