Most botnets are currently deployed for the distributed denial-of-service (DDoS) attacks but can also be used for delivering spyware, email spam, phishing, ‘click fraud’, stilling confidential information or the bitcoin mining. Here are tactics to combat bad bots.
Category: Organisational cybersecurity
Cloud, Edge and IoT trichotomy: cybersecurity concerns
The cybersecurity issues of the Cloud, Edge and IoT trichotomy are inevitably related to all of these complementary technologies. Cloud Computing is the delivery of on-demand computing services without direct active management by the user. These services range from applications to storage and processing power obtained from the remote data centres and available large number …
Continue reading Cloud, Edge and IoT trichotomy: cybersecurity concerns
Data breach? Not doing business with you, sorry…
Almost one in four Americans stop doing business with companies who have been hacked, and more than two in three people trust a company less after a data breach.
Computing on the Edge: How secure it is?
The Business Insider recently announced that there are about 10 billion connected IoT devices in 2018 and predicted that there will be 64 billion of these devices in use by 2026. The vast majority of these devices are or will be connected to the edge computing networks. But how secure it is?
Cybersecurity quandary: Is the third party betraying us?
The survey concludes that although nearly 80% of respondents believe software supply chain attacks have the potential to become one of the biggest cyber threats over the next three years. Few organizations are, however, prepared to mitigate the risks. Is, then, a third party betraying us or we are just inattentive? This issue must, anyway, …
Continue reading Cybersecurity quandary: Is the third party betraying us?
5G security: Is the cheese already moved?
With 5G just around the corner, it seems that people are struggling to understand all its facets - including cybersecurity. The 5G brings far-reaching changes, significantly different from previous generations of mobile communication networks as it will cause major modifications in technology and network architecture. This architecture will connect an enormous volume of the internet …
Weak cybersecurity can make benefits of the 4IR null and void
Raising cybersecurity awareness designates a necessary step in successfully addressing cybersecurity issues of the 4th Industrial Revolution and forming ‘cyber intelligent’ leadership, workforce and citizenry. The backdrop Almost all organisations in the future will be digital, and 60% of all global GDP will come from digital sources by 2022, according to the World Economic Forum …
Continue reading Weak cybersecurity can make benefits of the 4IR null and void
Habituation as cybersecurity nightmare and panacea
A number of studies confirmed that people often have a tendency to find ways to work around organisational cybersecurity policies. This is actually not something that they do on purpose but rather based on their habits. In other words, this behaviour is an effect of bad habituation. Achieving individual objectives and finding the way of …
Continue reading Habituation as cybersecurity nightmare and panacea
Building cybersecurity culture: are we locked into “Cyber Autism”?
“The problem is that we have a huge population that suffers from a form of cyber autism”- Eh'den Biber. After a number of serious complaints in recent months, Facebook says that they are all about privacy now. A very recent survey presented at the RSA Conference 2019 claims that data privacy was a top concern …
Continue reading Building cybersecurity culture: are we locked into “Cyber Autism”?
Looking Into the 2019 Cybersecurity Crystal Ball
Our crystal ball forecasts that the cyber-attacks and data breaches in 2019 will continue to increase in both frequency and intensity. The ransomware,cryptojacking, more focused spear phishing, IoT infiltration, shadow IT, cyber warfare, new online identification ways, push for better education and training, boards and executives involvement are just some of the predictions. It is …
Continue reading Looking Into the 2019 Cybersecurity Crystal Ball