The Healthcare Industry had for decades neglected their IT infrastructure, especially the aspect of Cybersecurity. Even at the time of this writing, it is not uncommon to see hospital-computers running…
Read MoreThe Healthcare Industry had for decades neglected their IT infrastructure, especially the aspect of Cybersecurity. Even at the time of this writing, it is not uncommon to see hospital-computers running…
Read MoreAmong the different kinds of malware threats, ransomware still retains its dominance, according to the Europol Internet Organised Crime Threat Assessment 2018. The Europol Assessment report says, “Even though the…
Read MoreForensic investigations became the “new normal”, as cybercriminals increased their activities at the expense of users and businesses alike. It is sad to admit that cybercrime is set to grow…
Read MoreAustralian statistics has revealed that 63 data breaches have been reported in the first two months of the year, which is something that needs to be addressed. Out of the…
Read MoreTenable, a cyber exposure firm, has recently released their Cyber Defender Strategies report with unexpected results. Of the 2,100 organizations assessed in the study, only 5% has consistently practice persistent…
Read MoreThe millennial generation has already started becoming an influential force in the workforce, hot on the heels of Generation X which it immediately succeeds. Millennials are people born from 1981…
Read MoreBecause the transfer of data used to function through the Sneakernet, personal computing in the 80’s and 90’s was a lot more simple. The slang term refers to the method users must adopt,…
Read MoreThe technology must evolve to counter cyber attacks. We have seen how the complexity and sophistication is one step ahead when it comes to cyber criminals. The situation needs to…
Read MoreAccording to the recently-released McAfee Labs 2018 Threats Predictions Report. It’s been a pretty scary year where cybercrime is concerned, with words like ransomware, malware and spyware becoming a part…
Read MoreCybercriminals alter the vendor’s website and replace legitimate apps with dubious ones that are meant to steal data from the user. If the ransomware got active in late 2016 with…
Read More