On June 19, Australian Prime Minister Scott Morrison reported that businesses are targeted by a sophisticated, state-based cyber actor. In recent months, there has been a prominent increase in attacks targeting all levels of government, political organisations, the private sector, essential services, education, medical research and development. Other countries are also detecting a similar pattern.
2 min read
Australian Businesses Under Attack - How To Protect Yourself
By Alma Pranoto on Jun 22, 2020 8:48:26 AM
4 min read
EDR - the Sherlock Holmes of cyber security
By Andreas Fuchs on Jun 2, 2020 11:00:00 AM
On the trail towards EDR
In our last blog post "Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection tools. Now we would like to present a typical Endpoint detection and response solution with its building blocks.
3 min read
Silent hacker attacks and the need for detection mechanisms
By Andreas Fuchs on May 26, 2020 2:00:00 AM
Again and again, we read about hacking incidents where attackers can spy on a company, an authority or a ministry and remain unnoticed for months without affecting the systems.
4 min read
4 Essential Strategies for IT Security
By Alma Pranoto on May 19, 2020 1:00:00 AM
The Base Formula for Preventing Cyber Security Incidents
7 min read
Working from Home - 13 Tips for Increased IT Security
By DriveLock on Apr 2, 2020 2:47:13 PM
From one of our previous post, "Coronavirus calls hackers to the scene", we are already informed about basic precautions and protection measures we must take when working from the home office.
1 min read
Stay Safe - Protection in your home office
By Vincent Ong on Mar 23, 2020 8:10:00 AM
As we brace ourselves to contain the spread of Covid-19 globally, it is of utmost importance for companies and enterprises to upkeep their business momentum in current challenging times. Increasingly, companies are encouraging employees to work from home to minimise physical contact. It is critical for endpoints to be well protected for employees to continue to be productive as they are working from home. However, the situation also presents opportunity for possible cyber security threats, malware attacks and social engineering to take place.
1 min read
DriveLock - perfectly positioned for RSA 2020
By DriveLock on Mar 17, 2020 8:43:10 AM
With over 36,000 attendees, 700 speakers, and 650 exhibitors, the RSA conference in San Francisco was a successful and rewarding event. The conference was attended by both boutique and well-known IT security firms from around the world.
3 min read
The Coronavirus gives hackers more freedom to infiltrate your network
By DriveLock on Mar 11, 2020 9:20:10 AM
What you need to consider when it comes to IT security to keep your systems virus-free.
In recent weeks, the coronavirus has become the main topic for the global population, health authorities, politicians and organisations. For hackers, the panic and hysteria caused by the situation provide a perfect opportunity to successfully distribute malware. Therefore, the virus topic meets all the requirements for a successful cyberattack.
People require up-to-date information regarding the virus. TV, radio, online guides and news, newsletters or emails are all sources of information that are accessed by the public.
3 min read
Modern Endpoint Security & EDR
By Alma Pranoto on Mar 6, 2020 12:58:37 AM
Prevention, Detection and Response - Do You Have Gaps In Your Security Architecture?
The importance of endpoint security continues to be prevalent in today's threat landscape as 70% of all breaches are found to have originated from the endpoint. More than 42% of endpoints experience encryption failures, 75% of organisations state their IT security team are not able to respond to security incidents aptly and quickly. Therefore Endpoint security plays a very significant role in securing your systems and data. It can prevent data loss, stop the execution of malware opened by negligent employees and protect against malicious traffic.
4 min read
3 Cybersecurity Trends For 2020
By Alma Pranoto on Feb 4, 2020 5:18:39 AM
The world of IT security is evolving in 2020, are we?
3 min read
IT security in 6 steps with Zero Trust
By Andreas Fuchs on Jan 24, 2020 3:35:53 PM
In the last blog post "What elements does a ZERO trust model consist of" we talked about the pillars of a Zero Trust architecture. In this article, we explain step by step how to implement Zero Trust in your company.
2 min read
Risk Assessment with the SPE model
By Mohamad Ashokaibi on Dec 20, 2019 11:29:13 AM
Risk lies around every corner and should be expected at any time. In the world of IT, risk is inherently everywhere and comes in many shapes and forms. Consequently, the task of writing down all possible risks threatening an IT infrastructure can be daunting and never-ending.
3 min read
What elements does a ZERO trust model consist of?
By Andreas Fuchs on Dec 3, 2019 5:11:01 PM
The major strategic goal of cyber security in the digital age is to combat and mitigate data breaches. A company's data is its most valuable asset to protect.
In the last blog post "This is how IT security works with Zero Trust today" we talked about what Zero Trust is and the rationality behind it.
5 min read
This is how IT security works with Zero Trust today
By Andreas Fuchs on Nov 20, 2019 7:51:35 PM
Why today's IT security architectures should be designed according to the ZERO TRUST model
4 min read
Simple Passwords Weaken IT Security
By Alma Pranoto on Aug 20, 2019 8:09:00 PM
2 min read
Is it really AI?
By Alfred Ortiz on Jul 30, 2019 3:40:00 PM
by Alfred Ortiz, CEO of CyberSoftwareDistributors LLC and Doctoral Candidate in Information Systems at IE University in Madrid, Spain.
4 min read
Zero Trust - The Blueprint To Safeguard Your Digital Business
By Alma Pranoto on Jul 2, 2019 9:18:49 AM
2 min read
Why Small Businesses Need a Managed Security Service
By Alma Pranoto on Apr 26, 2019 11:16:43 AM
3 min read
3 Benefits of a Managed Security Service
By Alma Pranoto on Mar 31, 2019 6:37:06 AM
3 min read
Extortion becomes the new normal for Cybercrime
By Andreas Fuchs on Jan 25, 2019 8:58:00 AM
In 2017, WannaCry Ransomware spread to 100 countries over a weekend. Don't expect patching to stop the business model of digital blackmail. Be prepared!
3 min read
3 min read
Rolling Out Microsoft BitLocker Without Headaches
By Alma Pranoto on Dec 7, 2018 12:30:00 AM
4 min read
Enforcing The Human Firewall
By Alma Pranoto on Nov 26, 2018 10:30:00 PM
By Alma Pranoto
4 min read
How To Make Endpoint Security Easy And Effective
By Alma Pranoto on Nov 21, 2018 10:30:00 PM
4 min read
3 Data Encryption Facts Your Business Is Missing!
By Alma Pranoto on Oct 24, 2018 3:02:45 AM
Picture by LaymanZoom | iStock
By Alma Pranoto
1. THE SHOCKING STATISTICS OF DATA BREACH
According to the IBM 2018 Cost of a Data Breach Study, it costs $3.86 million US to cover an average data breach. This cost will increase by 6.4% per year and the likelihood of a recurring breach over the next two years is 27.9%.
24 min read
Don’t avoid FDE adoption anymore!
By Mohamad Ashokaibi on Sep 24, 2018 9:12:00 AM
13 min read
Time to stop USB drive horror stories!
By Mohamad Ashokaibi on Jul 1, 2018 5:51:59 PM
Picture by Antonio Guillem
by Mohamad Ashokaibi
- CFO: “I've lost my USB thumb drive. Lots of important spreadsheets were there! Do something please!”
- Project Manager: “I’ve just used my USB external drive on a contractor’s laptop who said he never had an AV. Can I use it safely on the company’s laptop again?”
- Sales Lady: “Remember the USB drive the company has given me? Seems I dropped it in that taxi yesterday while on my way home. Could I ever know what I backed up on it before leaving the office?”
- Engineering Team Lead: “Since my colleague checked her SD card on my PC this morning I don’t seem to be able to open my project documents anymore. They all are unreadable. What could it be?”
-
Risk Management Head: “We have a new requirement; all USB storage devices must be blocked inside our corporate network, except company-provided sticks which must be encrypted before use. Can we do that?”
23 min read
And still nothing much done to educate our end-users!
By Mohamad Ashokaibi on Jul 1, 2018 5:39:05 PM
Picture by nd3000 | iStock
by Mohamad Ashokaibi