fbpx

Latest Security Opinions


How to secure IP against threat or compromise

Hackers are becoming more sophisticated and determined than ever. According to a Clark School study, there is a cyberattack every 39 seconds – a stat reflected in estimates that put the global cost of cybercrime at $6 trillion annually,  

Among the many areas of concern are the risks of Intellectual Property (IP) theft, defined by the FBI as “. . . robbing people or companies of their ideas, inventions, and creative expressions . . . which can include everything from trade secrets and proprietary products and parts to movies, music, and software.”


Cybercriminals vs. Granny

Cybercriminals with access to an older adult person’s information via a computer, smartphone, or another networked device, can easily exploit it for nefarious intent. And they do. Every year, cybercriminals steal approximately $40 billion from older adults (senior citizens aged  60 and over) in the United States.

The scope of bad actors targeting senior citizens can be explained by the lack of experience and skills in using computers/technology among the elderly, against the growing popularity of computer systems held by people of the same age, and the fact that most of them have credit cards.

In the past, people in their 70s and 80s hardly ever used computers. Nowadays, people of the same age have social media accounts, surf the Internet, and of course use smartphones.


Q&A: What the EU’s Privacy Shield ruling means for the UK

Last week, Europe’s highest court, the Court of Justice of the European Union (CJEU), invalidated the EU-US Privacy Shield, a legal framework relied upon by thousands of US and EU companies to transfer personal data from the EU to the US.

The decision is perhaps no surprise, given the CJEU’s long-standing concerns about the ease with which the US government could access personal data of European citizens. Privacy Shield itself was an attempt to readdress the balance of privacy in favour of EU residents — but it has now been deemed inadequate.


Interview: Cybersecurity after coronavirus, with Bitdefender’s Liviu Arsene

“Right now IT and security teams should probably focus less on stacking security technologies designed to detect sophisticated threats, and more focused on implementing hardening technologies, such as patch management, devices control, and encryption.”

That’s the opinion of Liviu Arsene, Global Cybersecurity Researcher at security firm Bitdefender, a company which has been serving the enterprise market since 2013 with GravityZone, an environment-agnostic security platform that is regularly ranked #1 in independent security tests.


Moving forward with track and trace technology

Reopening the economy while avoiding a second wave of Covid-19 is one of the biggest challenges of our time. Maintaining a low rate of transmission while opening up places of work and leisure is a delicate balance to strike, and localised outbreaks must be kept under control before they spread more widely. To do this requires a rapid, joined-up approach between regions, one which technology can enable.

With a raft of issues leading to the recent scrapping of the NHS’s contact tracing app, the pressure is on tech giants Apple and Google to provide a better solution. The apps currently provided are Bluetooth-based.


Security in the digital age: How safe do you feel?

User data, secure server, firewall safety, online password protection, cybersecurity, ransomware, GDPR, cyberattacks, phishing, data privacy, license agreement…these are all words that have come to drive us crazy.

The theme of the online climate is security. Companies, governments, customers and people spend much time, money and effort trying to protect themselves online. But what exactly are we protecting? Our identities, our records, our personal data, social media posts, privacy or is it something more? 


Five cybersecurity prescriptions for healthy healthcare in 2020

In 2019 alone cyberattacks cost the healthcare industry $4 billion, making it the worst ever year for data breaches.

If healthcare organizations are to gain ground on modern cyber threats, they must follow certain key security strategies to build much needed cyber resilience.

Here are five security prescriptions to keep the industry healthy:


Covid-19 and the reality of digital espionage

Finding a vaccine for the novel coronavirus is priority number one in the healthcare community. While an increasing number of countries appear to have joined China in getting the virus under control, there are legitimate fears that a second-wave could take many nations back to square one. Put simply, the surest way of preventing a Covid-19 resurgence is to develop and test an effective vaccine.

Developing a vaccine is a complex and challenging undertaking at the best of times. But to make matters even more complicated, experts on the frontline of these efforts have been subject to rampant cyber attacks in recent weeks. 


Fighting a virus – the cyber security approach

There has been a great deal of conversation around the similarities between the spread of the Covid-19 virus and that of computer viruses. And indeed, as the first global pandemic to occur during the age of connectivity, this comparison is valid. But while most focus on how we can leverage the knowledge gained in the “real world” in identifying and stopping the spread of plagues in the virtual world, I would like to offer another perspective.

Perhaps we in cybersecurity can return the favour. Perhaps the medical world can take the lessons learned in three decades of fighting “cyber viruses” and implement these in their fight to mitigate the coronavirus?


In an era of connected devices, manage your password like a CISO

As many of us stay home, we are relying more than ever on apps and online services to stay connected. But recent headlines have highlighted that the vulnerabilities within apps downloaded to our devices can leave them open to exploitation.

To add fuel to the fire, even the very connected devices we use are susceptible to attack. High profile breaches have come to light over the past year, notably a hacker being able to talk to a young girl via a home security camera in her room.

For organisations, this presents significant challenges when dealing with internal security. With the traditional security perimeter already weakened as a result of mass working from home, it’s crucial steps are taken to ensure the devices and online platforms we use to work remotely are robust and secure. 


Digital identities: protecting our digital twins

The pandemic has demonstrated just how much we depend on our online devices. From being able to work in the safety of our homes, to buying groceries online and booking virtual workout classes, it has proved that the move towards a fully digital world is within reach. Our dependence on the internet has also reminded us how much personal information we share – whether on social media, online banking and shopping, or our own professional profiles.

These characteristics that we openly disclose are exactly what fraudsters are looking for to exploit us – from using this information to pull our heartstrings in online dating scams to tricking our banks to gain access to our savings. We often overlook the trail of breadcrumbs of information we are leaving behind us, making it all too easy for a fraudster to take advantage.


Building trust into our technologies: democracy’s path forward in the present pandemic

For the first time in history, many elections will have to happen without in-person voting. In the US, we have already witnessed the pandemic’s impact on the Democratic Primaries, many of which continue to be postponed and mired in massive legal controversies. Throughout the ongoing pandemic, leaders continue to hotly debate whether or not elections that rely on in-person voting ask citizens to make a decision between civic participation and personal safety.



Do NOT follow this link or you will be banned from the site!