Coronavirus-era and the need for stronger cyber security

Our last issue of Security Buyer looked at the need for stronger cybersecurity. With the lockdown and the increased necessity for remote working, cyber security risks have heightened and organisations must be vigilant to keep their data secure The global pandemic of the Coronavirus, followed by the lockdown has forced businesses to re-evaluate the way in which they work, the structure, processes and security. When offices were told to close

Phishing scam

Multi-factor Authentication should be a top priority

The truth is, without multi-factor authentication (MFA), businesses are open to attacks if their employees fall for phishing scams or share passwords, which happens much more than you think (yes in your organisation too). Compromised credentials are an extremely dangerous threat to any company. Why is that? Once the attacker was able to compromise a set of corporate credentials, he is now in possession of valid credentials to login which


Think 3,2,1 to protect your business against ransomware

Rick Vanover, Senior Director of Product Strategy, Veeam discusses how to protect your business against ransomware in a cyber world. The war on ransomware is real. In the past few years, this form of attack has become a valid threat to businesses. We have seen huge attacks that have rendered multinational organizations, even governments, vulnerable and unable to continue mission-critical operations. In 2017, WannaCry brought hospital IT departments across Europe

Connected Technologies Connect ONE Safe Passage August 2020

Safe Passage Helps Businesses Get Back to Work

New Connect ONE feature targets return-to-work strategies with an automated process that can be customised to individual spaces, conditions and regulations. The Safe Passage Module now available as part of the Connect ONE cloud-hosted platform from Connected Technologies is a framework for a one-time or periodic self-approval process for facility access control. Perfect for back-to-work strategies during the pandemic or to ensure health and safety compliance, it provides an automated

Cloud technologies

Cloud is a Business Priority in the COVID-19 Shutdown

1,077 respondents across 9 countries are relying more on cloud technologies and seeing more cybersecurity attacks, according to Zogby Analytics Research Infoblox, the provider of Secure Cloud-Managed Network Services, and Zogby Analytics unveil research into the ongoing IT challenges posed by the COVID-19 shutdown. Half a year into the shutdown, companies are still playing catch up to optimise their remote work experience. Based on 1,077 responses from the US, the


Ripple20: Dealing with the turncoat Treck stack

Jeff Costlow, CISO, ExtraHop, discusses the series of 19 vulnerabilities found embedded in many devices worldwide and how insecure components can lead to insecure products In network security, the past can come back at you hard. In few places is that clearer than the recent Ripple20 revelations, a series of 19 vulnerabilities found in the Treck TCP/IP software stack which—researchers say—have worked their way into hundreds of millions of embedded

DDos Attacks and Cyber Security

Cyber economy continues to surge while DDoS attacks increase by 542% amid pandemic

The recently released Dark Web Price Index 2020 reveals the current average prices for a selection of cybercrime products and services available “on demand.” A basic targeted malware attack in Europe or the US costs $300, while a targeted distributed denial-of-service (DDoS) attack goes for as little as $10 per hour or $60 for 24 hours. The “salespeople” even offer volume discounts, making such attacks the go-to weapon for online

Email fails

Five familiar email fails

Five familiar email fails: Why they could be more than an embarrassing mishap Email is a fundamental component of business communications. The benefit of near instant messaging, no matter the location, means that business deals and management can be conducted quickly and seamlessly. But our reliance on email as a communication tool has inspired an element of complacency amongst users. The repetitive and familiar nature of email usage means that

Ransomware attack

Canon victim to Maze ransomware

News is breaking that Canon has been hit by Maze ransomware gang – notoriously known for double extortion threats – and their stealthy TTPs.  John Shier, senior security advisor, Sophos comments on the news: The ransomware attack on Canon is yet another example of the Maze gang’s sustained and brazen targeting of enterprises. Following other recent high profile attacks, this latest salvo should be a wake-up call to all the


Why do we treat hacked companies as criminals?

Mark Rodbert, CEO of idax Software analyses why companies and the public treat hacked businesses as criminals. Whenever it is announced that an organisation has suffered from a cyberattack, the blame is almost automatically shifted onto the company itself. To some degree, this is the right position to take. These businesses are entrusted with the personal data of potentially millions of customers: personal information, financial details, home and email addresses.

Do NOT follow this link or you will be banned from the site!