Latest Security Opinions
Cloud computing has offered a wealth of opportunity for businesses across the globe. From encouraging vast and continuous development of services, applications and platforms, to giving companies a myriad of choices when it comes to finding the right solution to drive business benefit. However, cloud computing does open the door to new risks that need to be acknowledged. These risk factors come in many different shapes and sizes, including unauthorised system access, mass data loss, or the complexity of network identity management.
Visibility is absolutely key for businesses to make informed and educated decisions. Without the full picture, correct decision making is nearly impossible and will ultimately lead to failure. With an understanding of where the risks and threats lie, companies can build a defence to mitigate these threats; this is where having centralised connectivity is essential.
A common assumption about cyber attacks is that they’re all about theft. But that’s not always the case, as data manipulation attacks illustrate. This type of attack is where cyber criminals access the target system and make undetected changes to data in order to elicit some form of gain, but without any outright theft taking place. Sometimes referred to as “the hack you might not notice”, they have the potential to cause immense damage.
Over the years, there has been an ongoing battle between those looking to advance technology and those looking to pinpoint its weaknesses. Whether it be computers versus viruses, or encryption versus hacking, there is often an overarching theme of good vs. evil when it comes to technology.
Perhaps this is to be expected. As the world has become more and more gadget-obsessed, we have seen a simultaneous rise in our dependence for effective cybersecurity. Hackers are getting smarter, and can now break down security defences using more innovative methods than ever before.
Cybercrime is getting smarter and data is growing in value. So, as cyber-attacks become more sophisticated, businesses need to rise to the challenge and protect their digital operations. This October is National Cybersecurity Awareness Month, which aims to draw attention to the threats that are putting businesses, and individuals, at risk. To highlight the importance of this awareness month, Techerati spoke with seven industry experts to get their thoughts and advice.
Over the past few years, cyber security specialist Frank Satterwhite has been working with a talented group of cyber engineers to create and package a security platform that allows users to protect their data in cyberspace. One of the group’s key focuses is on increasing mobile cyber hygiene as smartphones become the default device for most digital tasks at home and, increasingly, in the workplace.
Smartphones have become the central tool of our daily digital lives, whether for facilitating quick communication with friends and family, browsing social media or keeping up to date with the latest news. But from a cyber security perspective, mobile devices present easy targets for hackers seeking to compromise personal data.
In a few short years, Slack has transformed from a relatively unknown cloud application into one of the most popular team collaboration solutions in the world. For many enterprises, Slack is initially used in small, unsanctioned (shadow IT) deployments amongst internal workgroups. From there, use of the app typically balloons so quickly that it simply cannot be ignored. Today, Slack boasts over 10 million daily active users and more than 85,000 paying customers worldwide.
Ecommerce is booming, it’s fast-moving and exciting. However, someone is trying to steal from you – but they aren’t taking your products. They are pickpocketing your customer’s data, directly from their machines and in the process damaging your reputation, sometimes irreparably.
Data breaches are not a new phenomenon; the frequency and size of attacks have increased dramatically since Magecart first appeared in 2015. Even worse, you now have to publicly report them to the ICO. Damage limitation has never been so important.
It’s Rugby World Cup time in Japan, with the first round of rugby union’s most elite competition kicking off over the weekend. During the next few weeks, thousands of fans will travel far and wide across the country to soak up the action. In addition to bringing bundles of optimism about their teams’ prospects, die-hard supporters will arrive armed with a legion of connected devices.
Chester Avey outlines what firms must prioritise in the fight against the latest ransomware threats It might seem like a long time ago since WannaCry, which caused widespread disruption to the NHS other businesses, but ransomware attacks continue to make headlines. In fact, two very recent attacks successfully targeted two major US cities, Baltimore and… Read More
Within the next two years, the amount of smartphone users will reach over 2.87 billion, from 2.57 billion users today. The majority of these users have always-on internet connectivity, providing them the ability to control devices from the palm of their hand, but how does this functionality connect to devices at home or at work?
When your individual devices are secure, the main point of entry into your IoT is going to be through your main network. There are many different methods that you can use to secure your networks against potential threats, but here are a few of the most effective: