Category «insights»

What are your 2018 cybersecurity intentions?

2018 intentions

What are your 2018 cybersecurity intentions? With another year of too many high profile, and quite frankly avoidable, data breaches under our belts, it’s time to take a look forward and identify areas where you may be able to improve your security program and hopefully become more efficient and reduce risk more effectively. The list …

Six ways security teams sabotage their own work

Sabotage

Six ways security teams sabotage their own work It’s not always the bad guys that sabotage enterprise security efforts, sometimes organizations do that all on their own. Here are six common ways: Enterprises fail to plan Too many organizations fail to create an information security plan that is purpose-built for their organization. When the right …

Common Mac OS Threats Reveals Adware-Serving Trojans

CLIP_Spyware alert

Study of Common Mac OS Threats Reveal Adware Serving Trojans Steering clear of adware-serving threats can be difficult—many are bundled with software or appended to malicious email attachments. As a global security technology company that offers cutting-edge cybersecurity solutions and advanced threat protection technologies to more than 500 million users worldwide, Bitdefender has a unique …

Bad Rabbit Ransomware – what we know

Bad Rabbit

Bad Rabbit Ransomware – what we know A new strain of ransomware that has emerged today has hit a number of high profile institutions in Russia and Ukraine, such as the Kiev metro system, the Odessa airport, as well as the Russian news agency Interfax. The new family of ransomware is dubbed Bad Rabbit and …

Chrome crypto-mining extension discovered

CLIP_chrome cryptoware

A Chrome browser extension, with over 140,000 users, is gobbling up the resources of users’ computers by secretly mining for virtual cash. The SafeBrowse plugin claims to let you surf the web without the nuisance of wasting time, waiting for annoying advertising pop-ups to disappear so you can, for instance, get your hands on a …

Data Breach Notification Laws: What you should know & your Customers can’t ignore

CLIP_data breach laws

Data Breach Notification Laws: What you should know & your Customers shouldn't ignore On 22nd February 2018, the Federal Governments mandatory Data Breach Notification Law comes into effect.  This legal obligation will potentially have an impact across any business, and their “service providers” that handles personal information or has responsibilities under the Privacy Act. All …

IoT – Security remains one of the biggest concerns

CLIP_smart-IoT

IoT – Security is the biggest concern It’s safe to say that the concept of the Internet of Things (IoT) has progressed to the point where a growing number of organizations are exploring the opportunities. What might not be so safe is the IoT itself; security remains one of the biggest concerns and challenges of …

Ransomware attacks increase 300% in 2016

BLOG_Ransomware 300317

In 2016, the number of ransomware attacks increased 300 percent from 2015, with over 4,000 attacks detected per day, according to US government statistics. Ransomware is among the worst types of infection, as it not only encrypts network data, but in the end may cost victims all their data – even if they pay the …

What will 2017 hold for cybersecurity?

BLOG_Security predictions 2017

What will 2017 hold for Cybersecurity? There is no doubt that 2016 was a big year in cybersecurity. From vulnerabilities discovered in significant applications, business email compromises, security breaches of high profile organisations, DDoS attacks, and allegations of a hacked US Presidential election. Prediction for 2017 don’t look like it is going to get any …

New Study Paints a Frightening Picture of the Cyber Security Landscape

BLOG POST_Cyber Security Landscape

New Study Paints a Frightening Picture of the Cyber Security Landscape A recent report by the Institute for Critical Infrastructure Technology (ICIT), a cyber security think tank that acts as a conduit between the private sector, U.S. federal agencies and the legislative community, paints a frightening picture of the information security landscape. The study, “Rise of …