Home » cybersecurity » Page 17

cybersecurity

3 Cybersecurity Resolutions for Businesses in 2021

Sourced from IDG Connect Between more sophisticated cybercriminals and immense pressure to ensure governance on compliance, 2021 is already shaping up to be a minefield. And as such, cybersecurity has risen to the top of most organisations’ agendas. With this in mind, here are three cybersecurity resolutions every business should consider this year: Watch out – Dark Clouds are on the horizon Businesses haven’t been the only ones accelerating their digital transformation this year – cybercriminals have been hard at it too. There has been a sharp rise in ‘Dark Clouds’ as cybercriminals have migrated to the cloud, often for the same reasons businesses have – cloud allows them to avoid big up-front capital expenses, pay monthly for their shady businesses and scale up only when they need to. Co...

5 Cybersecurity Threats to the COVID-19 Vaccine

Image sourced from TimesLIVE Cybercrimes have increased since the beginning of the COVID-19 pandemic with hackers becoming heavily resourced, especially now with nations across the world in the implementation stages of rolling out vaccines. Hackers have found sophisticated ways to target the organisations that have valuable data such as vaccine development, trials, etc. Here are X cybersecurity threats to the COVID-19 vaccine: 1. Cyber Espionage to Steal Vaccine Data  A viable vaccine is valuable intellectual property. Beyond the pharmaceutical formula itself, even data on testing and drug trials can be valuable to an organisation working to develop its own drug. With countries struggling to secure an effective vaccine,  such data is a tempting target.  In late 2020, North Korean...

How to Keep Hackers Out of Your Zoom Call

With the onset of the COVID-19 remote work exodus that has seen billions stuck at home, video conferencing apps have exploded in popularity. At the forefront is the service Zoom. However, with Zoom’s explosive popularity came a series of highly publicized security issues. To unpack this, ITNA’s Jenna Delport chatted with Gabe Goldhirsh, VP MEA at digital risk protection company, ZeroFOX. Here’s what transpired: Why is Zoom, in particular, the target platform of choice for dedicated cyber attacks? And was it about Zoom that made it so popular to users in the first place? The rapid movement to remote work as a result of the pandemic caused a near-overnight acceleration and adoption of all collaboration tools – especially to Zoom (due to its platform ubiquity, ease, and no/low cost licen...

6 Ways to Stay Safe Online this Safer Internet Day

Working remotely has been the new norm since its introduction last year. As such, employees must be stricter about keeping themselves safe when online. In light of Safer Internet Day (SID), businesses need to invest in the latest cybersecurity to be able to protect the online operations of their remote staff. “Moving into the technological space offers great opportunities and benefits to organisations, however, without proper cyber risk management and data security, all your assets are left vulnerable,” says Rian Schoeman, head of legal and chief privacy officer at LAWtrust. With this in mind, here are six ways to stay safe online: 1. Make sure your site is secure Secured websites are protected with a Transport Layer Security (TLS) certificate. This certificate confirms that the site belon...

Apple’s App Store hosting multi-million dollar scams – developer

Mobile app developer Kosta Eleftheriou has a new calling that goes beyond software development: taking on what he sees as a rampant scam problem ruining the integrity of Apple’s App Store. Eleftheriou, who created the successful Apple Watch keyboard app FlickType, has for the last two weeks been publicly criticizing Apple for lax enforcement of its App Store rules that have allowed scam apps, as well as apps that clone popular software from other developers, to run rampant. These apps enjoy top billing in the iPhone marketplace, all thanks to glowing reviews and sterling five-star ratings that are largely fabricated, he says. Up to now, I’ve been in the “Apple *wants* to do the right thing” camp. My viewpoint is starting to change. How to spot a $5M/year scam on the @AppS...

6 Trends Shaping Cybersecurity in 2021

Sourced from International IDEA Business operations have changed beyond recognition with most employees working from home in a transition that happened almost overnight. Stretched security teams have been challenged to rapidly deploy robust remote working facilities to maintain productivity while others were writing the ‘pandemic playbook’ as they went along. With this in mind, here are six trends to expect in 2021: 1. Remote-working focuses attacker attention on mobile compromise As business becomes more mobile than ever and remote working persists, mobile devices and operating systems will be increasingly targeted. In 2021, more employees will use personal devices to review and share sensitive corporate information, these become an excellent point of ingress for attackers. 2. Continuing ...

5 Cybersecurity Breaches and How to Prevent Them

Threat actors have ramped up their attempts to pollute the IT networks of hospitals with ransomware even as the COVID-19 pandemic continues, according to the recent findings of INTERPOL. The adverse outcome of such an incursion is not restricted to data damage or monetary damages to the organization. It also hinders quick medical response and has the potential to impact the physical well-being of the patients, making the situation a literal matter of life and death. The following five tips can help healthcare institutions ensure that they are less susceptible to ransomware attacks: Education: Training users on how to identify and avoid potential ransomware attacks is crucial. As many of the current cyber-attacks start with a targeted email that does not even contain malware, but only a soc...

3 Cyber Threat Predictions for 2021

The beginning of the year is always a sound time to review the main developments and incidents that took place in the cybersecurity industry. Lockdown measures driven by the ongoing pandemic have changed systems around the world. Digitalisation, which is the main driver of these changes, will maintain momentum in 2021. To look at the impact these events had on organisations and individuals, and predict what they could mean for the overall evolution of the threat landscape, Kaspersky shares its vision on what we could face in terms of cyber threats in such areas as healthcare, education and ICS attacks in 2021: 1. Evolution of ICS oriented attacks Each year actors develop more and more advanced targeted threats. Some closely examined features of industrial businesses and gained access to va...

Top 10 Suspicious Email Subject Lines

Phishing emails related to working from home are on the rise, according to the latest report from KnowBe4. Social media messages are another area of concern when it comes to phishing, and LinkedIn phishing messages dominate as the top social media email subject to watch out for, holding the number one spot at 47%. “It’s no surprise that phishing attacks related to working from home are increasing given that many countries around the world have seen their employees working from home offices for nearly a year now,” says Stu Sjouwerman, CEO of KnowBe4. “Just because employees may be more used to their home office environment doesn’t mean that they can let their guard down. The bad guys deploy manipulative attacks intended to strike certain emotions to cause end-users to skip critical thinking...

5 Tech Trends to Watch in 2021

2020 was a year in which the tech industry came into its own and learned lessons about adaptability, resilience and collaboration that have changed the way we work forever. Perhaps the hardest thing for businesses this year was the uncertainty – which makes predicting trends for 2021 more challenging than usual. But as we move into what will hopefully be a post-COVID reality, here’s a view of the top five tech trends that will impact local businesses in the coming year. 1. Welcome to the Internet of Behaviours (IoB)  Anyone who loves a good tech acronym will know the Internet of Things (IoT), is the network of interconnected physical objects – from fridges to data centres – that gather and exchange information and data over the internet. The Internet of Behaviours (IoB) takes this dat...

The Role Of Artificial Intelligence In Enhancing Cybersecurity

The Cold War period fostered all sorts of technological advancements, whereas in contemporary times the more technologically advanced the world we have the more cybersecurity is at risk. Combining the quality of artificial intelligence (AI) with cybersecurity, security experts have extra assets to guard helpless systems and information against cyber assailants. After applying this innovation, it brought moment bits of knowledge, coming about in diminished reaction times. Artificial Intelligence And Bitcoins. We can barely avoid the role of artificial intelligence which is more beneficial in bitcoins trading. Bitcoin trader in the cryptocurrency market uses the exchange framework which is automatic in nature in order to earn confined wages. Valuable metals such as silver and gold are compar...

7 Online Banking Security Tips for Africans

The Internet and the digital migration of the last three decades have pulled Africa closer to the rest of the world. Trends in various fields reach us more quickly now, and the continent is moving at the same rate as developed countries in markets such as online banking. Unfortunately, not many Africans know the risks they expose themselves to when accessing their bank accounts remotely and therefore go about making transactions without any caution whatsoever. In this article, we shall discuss top tips to avoid the security risks associated with online banking. 1. Use a VPN Do you have a device that you frequently use to access your online banking account? If you do, consider equipping it with a virtual private network. Virtual private networks (VPNs) anonymize internet connections, making...