Cloud Consultancy News
Stay Protected: 5 of the Most Important Cybersecurity Training Tips For Your Employees
It is believed that the most sophisticated cyber attacks are the biggest threats to any organization. However, the biggest cybersecurity threatto a business is the people that work there. In fact, eight out of ten top data theft are as a result of human error. This...
Everything You Need to Know About Microsoft and Samsung’s Latest Partnership
Samsung announced a lot of new things last night. But more importantly, it announced an expansion of its existing partnership with Microsoft. Both the companies have been working together for a while, with Samsung shipping some of Microsoft’s apps pre-installed on its...
Six critical areas to focus on when integrating DevSecOps into an organisation
The omnipresence of consumer electronics and computer power, alongside modern trends (i.e., DevOps, microservices, and open source) that accelerate deployment cycles continue to strain enterprises’ ability to detect and identify exploitable flaws in a timely manner....
Increase Social Media Awareness With Active and Passive Testing
peaking on “Testing Your Organization's Social Media Awareness” at Black Hat USA, Jacob Wilkin, network penetration tester and application security consultant, Trustwave SpiderLabs, said that social media phishing is on the rise and is now the “preferred vector for...
Malwarebytes Launches Malware Remediaton Service
Malwarebytes today launched a malware removal service that makes first responders in the form of cybersecurity professionals available on-demand to organisations currently under cyberattack. Kevin Latimore, enterprise malware removal specialist for Malwarebytes, said...
What are the cybersecurity challenges facing the healthcare sector?
The monetary value of PHI can be enormous. As a result, attackers are employing increasingly sophisticated techniques to gain access to patient health records. Healthcare organisations are aware of the extremely sensitive nature of patient data, and consequently the...
Microsoft has warned that Russian hackers can infiltrate into a corporate network by compromising IoT devices such as VOIP phones, office printers, and video decoders.
Microsoft Threat Intelligence Center attributed the attacks to the STRONTIUM APT group, also known as APT28 and Fancy Bear. The compromised IoT devices include VOIP phone, office printer, and video decoder. Microsoft security researchers have observed that a...
Tricking attackers through the art of deception
In cybersecurity, deception is redundant if it cannot fulfill its critical aim – to misdirect, confuse, and lure attackers into traps and dead-ends. It is the art of tricking attackers into overextending and exposing themselves. To deceive attackers, an organization’s...
Most SMBs have not identified and documented cybersecurity threats
A majority of small and medium-sized businesses (SMBs) do not have cybersecurity protection at the top of their agenda and are highly prone to risks and vulnerabilities, according to ConnectWise. The risk assessments reveal that an alarming 69% of SMBs have not...
Phishing is a billion-dollar global industry, consumers are the main target
Phishing is a growing pain point for individuals, businesses and CSPs, according to Allot. Consumers are the main target of these attacks, and they are calling for better security for their data and financial information. The research shows that they are right to be...