facebook_pixel

اليوم: 24 نوفمبر، 2020

Back to Basics using analogue and manual methods to counter cyber threats

Back to Basics: using analogue and manual methods to counter cyber threats

In the realm of cyber security, the use of pens and paper is usually a sign that something has gone badly wrong, and that the victims of the attack – be it in the form of a hostile takeover, or the forced installation of malware or ransomware – are resorting to physical means as a …

Back to Basics: using analogue and manual methods to counter cyber threats قراءة المزيد »

Vulnerabilities of the medical sector

Vulnerabilities of the medical sector

Ransomware attacks, while a significant danger to both companies and individuals, can also constitute a major threat to medical personnel and their patients. This was found first hand by Paul Pugsley, an emergency medicine resident Maricopa Medical Center in Phoenix, Arizona. Pugsley was attempting to administer a CT scan to his patient who had suffered …

Vulnerabilities of the medical sector قراءة المزيد »

Recent slew of ransomeware attackers raises prominence of cyber security

Recent slew of ransomeware attackers raises prominence of cyber security

A slew of ransomware attacks in recent months have brought the issue to greater prominence and raised justifiable alarm. While data theft and conventional hacking are alarming enough, ransomware attacks entail affected users being locked out of their systems until a demanded fee is paid; there is, of course, no guarantee that access will be …

Recent slew of ransomeware attackers raises prominence of cyber security قراءة المزيد »

Cryptojacking: What it is and how to protect yourself

Cryptojacking: What it is and how to protect yourself

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Cryptocurrency is simply a digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds operating independently of central bank. It is a digital asset that has been created to work as …

Cryptojacking: What it is and how to protect yourself قراءة المزيد »

8 Ways App Development Companies Can Improve Cyber Security Processes

8 Ways App Development Companies Can Improve Cyber Security Processes

The cyber world is evolving, and so is cybercrime. In 2016, Ponemon Institute established that the average cost of losing sensitive corporate or personal information is approximately $ 4 billion. The FBI reports that more than 4,000 ransomware attacks occur daily, while other research sources state 230,000 new malware samples are produced every day. In …

8 Ways App Development Companies Can Improve Cyber Security Processes قراءة المزيد »

Qualities of a Good Chief Information Security Officer

Qualities of a Good Chief Information Security Officer

Information security is typically the practice of preventing unauthorized disclosure, modification, access, use, disruption, inspection, and recording of information. The information can be electric or physical.Information security is built mainly around the following three objectives: confidentiality, availability, and integrity. Confidentiality means the information can’t be disclosed to unauthorized entities, process or individuals. Integrity maintains completeness …

Qualities of a Good Chief Information Security Officer قراءة المزيد »