Blog Category: Cybersecurity
Cybersecurity is complex and affects business. If you are an executive, have you considered whether you are fulfilling your fiduciary duty through cybersecurity strategy? If you are a CISO, have you taken a methodical approach to every increasing cybersecurity topic? If you are a non-IT person, have you wondered whether your enterprise information is secure? […]
A summary of measures taken to protect data when employees are working remotely.
Best Security Practices for Enterprises in the Post-COVID World
The major trends that have affected the healthcare industry in the coronavirus period as a way of preparing the organizations involved.
Cybercrime shot up in 2020, and institutes of higher education are near the top of the target list. Hackers looking for ways in have an easy job with faculty and students largely unaware of the dangers and unfamiliar with phishing tactics.
Technical aspects of cybersecurity aside, improving employee training is the best investment a company can make. Let's look at social engineering tactics, Smishing and Phishing, and the training programme Kevin Mitnick developed.
This summer of 2020, the long awaited 8GB version of the Raspberry PI 4 came out. Along with that hardware update came other goodies: USB boot: USB Gadget Image Builder (to have a fully functioning local network with you iPad Pro over USB C:
The SolarWinds attack was, to date, the largest scale cyber attack that affected hundreds of organisations. Because it went undetected for so long, its reach and effects are still the subject of investigation, and there will be ongoing debate as to the ways to prevent such attacks in the future.
Secure and protected passwords are the bedrock of every user’s internet security, but coming up with new passwords for each account, as well as securely storing all your data presents a daily challenge.
A ransomware attack whose sophistication and scale go beyond anything we've ever seen has recently hit Kaseya, an IT Management Software provider. We look into what has been uncovered so far, and what experts think will happen next.
Automated updates for the core OS has been available for several years now on Macs, and Apple has added the ability to update automatically apps you have added from the AppStore as well. However, if you have installed open source apps with Brew, chances are that you may forget to update them regularly. This is […]
The fifth annual report by ESG and the ISSA provides fascinating and alarming insights into the lives of cybersecurity professionals.
On 13 May 2021, the Laureate security team became aware of an ongoing ransomware attack directed against two UPC servers. Though the attacker managed to escape identification, it is clear that they were both financially motivated and unable to achieve their goal.
The cybercrime trends of last year continue in 2021 as the first half of the year has seen records of the previous year broken with even more vicious attacks.
Over the years NewPush has organized a series of online conferences which featured some of the leading minds of our industry. The latest such event took place on 31 March and was centered around the idea of disruptive innovation in cybersecurity.
The journey towards automation of detection and containment or eradication of security events are indeed an ongoing one.
The SlashNext State of Phishing Report 2023 has unveiled a concerning trend in the cybersecurity landscape, revealing a 1265% surge in malicious phishing emails since Q4 2022.
Cyber authorities representing the collection of 48 countries, the European Union and Interpol, gathered for the third year in Washington to advance efforts to fight ransomware activity. “As long as there’s money flowing to ransomware criminals, this will continue to grow,” Anne Neuberger, deputy national security advisor for cyber and emerging technologies, said in a pre-summit briefing.
This year has been a busy one for cybercriminals, with some massive data breaches making headlines and costing companies millions. From health care giants to project management platforms, no industry is immune to the risks. But what do these breaches mean for small to midsize businesses? The same vulnerabilities exist for you, and the consequences of not addressing them can be catastrophic.