Facebook iconTwitter icon
B2B-Network:
Practical Advice
Identification and Prevention of Phishing
Thumb phishing

Phishing is a modern-day online fraud that involves sending of suspicious messages, mostly using emails, to unsuspecting people requesting for sensitive information. The information usually requested are usernames, passwords for financial or other personal details. The common narrative used is detail verification with threats of terminating the service if the data requested is not provided. 

 

Common Signs for Phishing Attempts 


  1. Spelling and Grammar used in an email are the first signs of phishing. In case the meaning or structure of a sentence is incoherent, do not open any...

» Read more
Study
SonicWall Rings the Alarm with Nerve-Wracking Cyber Threat Statistics
Thumb mehr ransomware

SonicWall recently announced record statistics for ransomware attacks, malware volume, chip-based attacks, and encrypted threats in their 2018 SonicWall Cyber Threat Report. According to the CEO at The Chertoff Group, Chad Sweet, real-time cyber threat intelligence has become more dangerous than ever with cybercriminals unearthing new attack vectors such as chip-based and encrypted attacks. For organisations to stay safe in the cyberspace, they must utilise all tools in their security war chest. 

 

Malware Volume Continue to Rise From 2017’s Record Highs 

The...

» Read more
Analysis
Hidden and Unhidden Costs of Ransomware Attacks
Thumb ransomwarekosten

Ransom is only a small part of the cost that you are likely to incur when hackers attack your enterprise’s computer systems through ransomware. Although some of these costs go unnoticed, customer service interruptions lower businesses’ profitability heavily. But that is not all – read which costs a ransomware attack can mean for your company.

 

Direct Costs 

Most attackers target the enterprise’s data, therefore, leading to data destruction. Consequently, victims may choose to pay the ransom to relieve their captured data. You might even be...

» Read more
Analysis
The Biggest Cyber Security Threats United: Botnets and Ransomware
Thumb botnet ransomware

When it comes to the cyber threats, botnets and ransomware are currently dominating according to a Microsoft security study. The researchers collected the report by analysing data from Bing, Windows, Azure and Office 365. It seems to be essential for enterprises to be aware of such threats and come up with safety mechanisms to protect their date from attackers. 

 

How Hackers Are Evading Detection Lately 

Security experts are having a hard time detecting and fighting Locky ransomware that goes hand in hand with the Necurs botnet that has been spreading through...

» Read more
Analysis
Cybersecurity Risks Surrounding IoT Development in an Increasingly Connected World
Thumb cybersecurityrisks iot

The Internet of Things (IoT) is a superb innovation and has been deeply entrenched in every aspect of our lives. As IoT crawls into all aspects of our way of life, many security concerns arise, and the network connected to an enterprise or home could be a threat if compromised. Here are some of the risks that many people and companies are facing: 

 

Privacy Concerns in the IoT World 

With all the precautions that people take to secure data, the level of complexity displayed by cyber-attackers is extraordinary. Attacks can emanate not only from public networks but also from...

» Read more
Analysis
The Key to Organizational IT Security and Compliance
Thumb compliance itsicherheit

IT security and compliance are critical to the success of an organization. Without a proper IT security and compliance set up, an organization can't effectively protect its assets, which puts is entire existence at risk. Both IT security and compliance help the organization to strengthen security, improve processes, meet regulatory requirements, and achieve other important business objectives. IT security and compliance are the frameworks that provide a common language that can be used from server rooms to boardrooms.

For many IT professionals, IT security and compliance are more or...

» Read more
Analysis
The Benefits of Implementing Information Security Management Systems (ISMS) 
Thumb informationsecuritymanagementsystem

Information Security Management Systems (ISMS) is a term from the business continuity industry, and it relates to the policies and procedures you put in place to manage your IT security. Specifically, it relates to the protection of your IT data, and it is a popular topic at the moment thanks to the data protection rule changes that have occurred in the EU (GDPR), and it is popular worldwide because of the increasing success of data hijackers who insert ransomware into a company's systems, lock down some data, and then charge the company to unlock the data. It seems that companies have...

» Read more
News
VPN Filter More Dangerous Than Assumed
Thumb vpnfiltermalware

The malware "VPNFilter" was discovered in May, and it quickly became evident that the malware was wide reaching, and dangerous. Now that the infection has had time to spread, however, we are starting to appreciate exactly how dangerous. 

 

A Huge Number of Vendors Affected 

The list of affected devices is, essentially, a who’s who of router makers. Asus, D-Link, ZTE, Huawei, UPVEL and Ubiquiti are all on the list, as well as TP-Link, Linksys, Netgear, and numerous other manufacturers. The only piece of good news, so far, is that the vulnerable pieces of...

» Read more
Analysis
The value of Intrusion Detection Systems
Thumb intrusiondetectionsystems

Intrusion Detection is a system designed to monitor network traffic for any suspicious activities or known threats. If such anomalies are found, the system will provide information such as the type of suspected attack, the targeted address and where it came from. Intrusion detection systems can be categorized as host-based, if the sensors that detect the threat are placed on a host, or network-based, if the sensors are placed on a network.

 

How an IDS works

The main purpose of an IDS is to detect and report an anomaly, but not to block or stop it. This is in contrast to a firewall or...

» Read more
Practical Advice
The Importance of Physical IT Security
Thumb physische itsicherheit

Physical IT security can be defined as means of protecting components that are related to the system that include data, hardware, software, and networks. These devices are protected from events and actions that may occur physically – e.g. a robbery – which poses danger to the owner and the apparatuses. 

This type of security is mostly ignored and instead, technical and software threats are taken seriously. Therefore, placing enforced measures to protect the components against them is advisable. Basically, there are various ways that the components can be protected...

» Read more
Loader