• cybersecurity

Secure Telecommuting During the Covid-19 Crisis

How to secure your data and communication when working remotely The unprecedented rise in remote working following the Covid-19 crisis has led to a significant increase in attack opportunities for cyber criminals. Because all remote access occurs over the internet, any communication between teleworkers is susceptible to man-in-the-middle and eavesdropping attacks. Additionally,

2020-04-23T13:38:39+00:00April 23rd, 2020|

Verizon Incident Preparedness and Response Report (VIPR) 2019

Verizon recently released its 2019 Incident Preparedness and Response Report (VIPR) - “Taming the Data Breach” - based on data collected from companies across industry verticals between 2016 and 2018. The company analyzed the Incident Response or IR Plans of organizations from the finance and insurance (33%), retail trade (17%), manufacturing (15%),

2019-12-10T07:00:02+00:00September 26th, 2019|

Cyber Incident Trends Report (NCSC)

October 2018 to April 2019 The UK’s National Cyber Security Centre (NCSC) recently released its cyber incident trends report for the period between October 2018 and April 2019. The report covers five main cyber attack trends seen in the UK - (1) attacks on Office 365 deployments (and cloud services in general),

2020-01-03T06:18:02+00:00September 11th, 2019|

Network-based attacks

Cyberattacks come in all shapes and forms. They are everywhere, and whether you know it or not, you’ve likely been a victim of one at some point. Even an occasional look at IT news will tell you just how widespread cybercrime is and how many areas of life it affects. Yet many

2020-01-03T06:15:06+00:00August 22nd, 2019|
  • cyber attack trends

Cyber Attack Trends 2019 – Check Point Research

  Cyber Attack Trends 2019 Check Point Research released its 2019 mid-year report on Cyber Attack Trends last month. The report puts targeted ransomware attacks at the top of its list of dominant ongoing trends in 2019. Cryptomining attacks, on the other hand, have declined considerably over the past year, with only

2019-12-10T07:10:43+00:00August 19th, 2019|

Cybersecurity Insiders 2019 Cloud Security Report

Cybersecurity Insiders recently released its 2019 Cloud Security report based on a comprehensive online survey of cybersecurity professionals conducted in March 2019.  According to the survey, the biggest cloud security challenges that businesses face are data loss / leakage (64 percent) and data privacy / confidentiality (62 percent), followed by legal and

2019-12-10T07:12:40+00:00August 9th, 2019|
  • Cloud security

Security in the Cloud – Introduction

Service and Deployment Models, Challenges and Security Principles Most businesses think of cloud services as being either less secure than on-site services because they expose sensitive data to a wider range of possible attacks or breaches, or more secure because “everything” is taken care of by the cloud provider. The fact, however,

2019-12-10T07:13:54+00:00August 6th, 2019|
  • SANS SOC Survey 2019

SANS SOC Survey 2019

The SANS Institute released its 2019 SOC Survey report – Common and Best Practices for Security Operations Centers - earlier this month. The 2019 survey finds that artificial intelligence and security automation are failing to live up to their promise in the real world, with most surveyed security professionals being less than happy with the performance of the AI / ML solutions they have adopted. On the other hand, perimeter security, which is often given short shrift in current security-related discussions, continues to deliver solid, consistent results.

2019-12-10T07:15:43+00:00July 30th, 2019|

CIS CSAT – A web-based tool to track your implementation of CIS Controls

CIS CSAT is a free web-based tool that allows organizations to assess their cybersecurity strategy and infrastructure against the Center for Internet Security’s 20 Critical Controls. The tool was developed for CIS by EthicalHat Cyber Security, and is based on AuditScripts’ popular CIS Controls Manual Assessment spreadsheet. It helps businesses easily track their documentation, implementation, automation and reporting of CIS Controls, and compare their own security performance with the industry average.

2019-12-10T07:17:18+00:00June 13th, 2019|