cyber security (13)

9582931074?profile=RESIZE_400xWorking from home is a new work environment that will be with many employees and companies for years.  Since 2020 when the COVID-19 lockdowns began, cybercrime has increased drastically, and remote working has presented huge challenges and higher risks for many organizations. The surge of COVID-19 cases driven by new variants has challenged many companies to quickly devise long-term hybrid work models that meet the needs of their businesses and employees.  The term hybrid has been coined as ther

9562450097?profile=RESIZE_400xSince early in 2020, when the COVID-19 lockdowns began, cybercrime has increased significantly and remote working has produced major cyber security challenges and higher risks for many businesses and organizations.  The surge of CV-19 cases driven by new variants has challenged many companies to quickly devise long-term hybrid work models that meet the needs of their businesses and employees.  The term hybrid has been coined as there are many degrees from total office attendance to total at home

9546325898?profile=RESIZE_400xSecurity professionals have long wrestled with properly identifying rogue employees bent on crippling a company.  This was once evident in identifying stolen proprietary or classified paper documents for personal or professional gains – or some were just plain focused on outright revenge and destruction.  Now ‘everything’ is cyber related, yes everything, and thus cyber security meets with physical security, human resources (HR) and company management teams.  This lateral cooperation is a must i

9518436491?profile=RESIZE_400xUS Government Cyber Warning Summary:

Immediate Actions You Can Take Now to Protect Against Ransomware

  • Make an offline backup of your data.
  • Do not click on suspicious links.
  • If you use RDP, secure and monitor it.
  • Update your OS and software.
  • Use strong passwords.
  • Use multi-factor authentication.

The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have observed an increase in highly impactful ransomware attacks occurring on US holidays and we

9432902473?profile=RESIZE_400xA recent report by Ponemon Institute[1] and commissioned by Team Cymru found that half of the organizations surveyed experienced disruptive cyber-attacks from repeat sophisticated threat actors, the majority of whose exploits were unresolved.  Although organizations acknowledged experiencing disruptive attacks and from repeat offenders, total remediation was not possible.  According to the report, this situation left personal data and organizations’ infrastructure at risk of more attacks.  Last

8977429489?profile=RESIZE_400xDr. Alireza Jolfaei is a Lecturer in the Department of Computing at Macquarie University and provides a great view of cyber security and the use of white hat hackers from an Australian perspective.  “Beneath our streets and above our heads, in the power lines and the satellite links that crisscross our cities, a constant war is being waged between the forces of malicious hacking and the cyber-security defense systems that must stay one step ahead to keep society running.  Targets everywhere: Aus

8759297281?profile=RESIZE_400xUS Lawmakers and security experts have expressed disappointment that US President Joe Biden’s $2.25 trillion infrastructure plan does not include funding to protect vital facilities against the growing threat of cyberattacks.  This infrastructure package failed to provide money to defend critical systems, such as the US power grid, against hackers, according to media sources last week.  “Any critical infrastructure modernization must take cybersecurity into account from the start,” said the OT d

8741232478?profile=RESIZE_400xMany countries are investing seriously in their 5G network, especially in Asia – China leading the way.  But beware: more connectivity through 5G networks also comes with increased cybersecurity threats.  As new technology links both the physical (OT) and virtual world (IT), 5G security risks will have wide security impacts.   To overcome these security challenges, researchers need to build security regimes that protect not only 5G infrastructure and services, but the applications and IoT device

8692875888?profile=RESIZE_400xPhysical security concepts and practices has been around for centuries.  Cyber security, not so long.  We all are painfully more aware than ever of the need for strong cybersecurity.  Network security should be in most business systems, yet the Internet of Things (IoT) has opened the realm of malicious cyber-attacks to a height unseen in recent times.  IoT in any open space creates the potential for various cyber-attacks that can disrupt system operation and negatively impact a customer’s busine

8326228084?profile=RESIZE_400xWith the new incoming US government and other international countries looking seriously at renewable energy sources; so are hackers, who are no fools and are researching ways to compromise the future of energy.  The ‘rush’ to renewable energy technology may open multiple cybersecurity threats and vulnerabilities if caution is not placed on cyber security and these energy source developments. 

Quick developing solar and wind technologies present new risks to power grid security, especially as sma

8237756658?profile=RESIZE_400x“There is a strong need to balance the benefits of new technologies with safety and security concerns, in particular cyber-security," Heike Deggim, director of maritime safety at the United Nations sponsored International Maritime Organization (IMO), told the International Safety@Sea webinar series organized by the Maritime & Port Authority of Singapore (MPA).  “Many people tend to have a very outdated view of what modern shipping looks like.  Modern ships are technologically advanced workplaces

4057063184?profile=RESIZE_710xRemember Mad magazine’s spokesman, Alfred E. Newman and his catch phrase, “What me Worry?’  This attitude is has taken root in many organizations’ views of cybersecurity and shows little improvement.  Cyber security experts estimate that only one in three small medium sized businesses (SMB) and small municipalities, with 50 or fewer employees rely on free or consumer-grade cybersecurity products.  Additional research indicated that one in five companies do not use any endpoint security either. A


In daily business, you use strong passwords, change them often, update your anti-virus software and use common sense to protect yourself from malicious attacks that could harm your home computer.  But what else can you do when you travel?

When you are traveling, you are unaware of many types of threats, how can you keep your communications gear safe when you are not in the office or your own home?  According to a recent report, loses related to cybercrime is projected to exceed $6 trillion by 2