Facebook iconTwitter icon
B2B-Network:
Analysis
Cyber hygiene: All you need to know 
Thumb cyberhygiene

Cyber hygiene is the practice of keeping your organisation's computers and devices in good working order and adequately protected against the threats of malware, hacking and viruses. It's a form of risk mitigation, and having a cyber hygiene routine in place is as essential to the health of your IT system as brushing your teeth with toothpaste twice daily is for your dental health. 

You can keep your system as healthy as possible by following these steps: 

 

Put a cyber security framework in place 

Adhere to a cyber security framework which is a coherent plan to...

» Read more
Studie
It's Time to Make the Most of IT Professionals for IT Security
Thumb it

Findings of a recent ISC² study show that companies are not fully using their IT professionals when it comes to cybersecurity. Also, they are not making the most of opportunities to train equip these professionals who play such a vital role in protecting their organisations from cyber threats. Over 3,300 IT professionals were surveyed across the world to deliver these findings as part of a Global Information Security Workforce Study for 2017. The survey shows that proper training and accreditation for IT staff is important because it is the most effective way for many companies to...

» Read more
Comment
The Increasingly Important Role of Managed Security Service Providers
Thumb security

The threats found within the digital world are now more serious than ever before. Whether referring to Zero-Day Ransomware, phishing or DDoS attacks, organisations need to take such possibilities very seriously. The irony is that procuring adequate levels of protection can prove to be challenging for businesses which have neither the time nor the experience. Thus, the role of the managed security service provider becomes quite clear. 

 

Layered and Thorough Protection

From a general point of view, the managed security service provider (MSSP) is concerned with...

» Read more
Practical Advice
Embracing Shadow IT in businesses
Thumb schatten

What happens when employees feel that the IT department is not being innovative enough to fulfilling their needs? Employees may become less innovative and inefficient in their duties, but with the pressures of performing on today's workplace, they tend to find solutions elsewhere. This is why shadow IT is quickly growing as an alternative solution.

 

What is Shadow IT?

When technology is implemented by an individual or team without the approval of the IT team it is shadow IT. For example, an entire department may decide to use a different cloud computing environment from the rest...

» Read more
Practical Advise
4 Tips on creating a culture of cyber security at the workplace
Thumb coding

Nowadays, most businesses face cyber security challenges that compromise their assets and employees' safety. By finding means to proactively protect their staff and clients, they can keep their organisation safe and secure. Running a small business can make you an easy target for online fraudsters and hackers. Similarly, if you are part of a multinational corporation, your company may still be at a higher risk. Having adequate resources and maintaining a dedicated information technology team will help secure your network. Here are a few tips on how you can create a culture of cyber...

» Read more
Analysis
ROI on Cyber Security
Thumb itsicherheit

Measuring return on investment (ROI) on something that can only be speculated to occur is a tough task. The security managers always face the hard task of trying to convince the board of directors on the reason they need an increase or when defending a budget. This has become hard for companies to measure their ROI based on security as it is difficult to quantify

 

How can ROI in security be determined?

The term ROI originates from the financial industry and focuses more on income rather than cost savings. When ROI is used together with security, its initial meaning is compromised...

» Read more
Inside Story
Rise Of The Bots! The Ever Increasing Number Of Unprotected Online Devices Is Making DDoS Attacks Easy
Thumb data header

At the end of October the Internet was shaken up by a DDoS attack of unprecedented sophistication. It was carried out by a network of bots that had infected different devices mainly in the United States, notably a large number of security cameras.

The drama began to unfold in real time on the twitter account of IT expert Rob Graham. After installing a new camera he had bought online from Amazon for $55, Graham started to notice strange behavior almost immediately. In less than 2 minutes Graham's camera had been infected by 'Mirai'; his camera had now been 'weaponized'...

» Read more
Practical Advise
Protecting Your System against Ransomware
Thumb 4

Ransomware has been an increasing threat over the past few years with businesses and consumers facing terrible losses. This type of cybercrime involves hacking of critical information and then holding it for ransom until the owners pay. Most of these attacks target companies where data is a vital resource. A majority of ransomware infects systems through emails. Users click on infected links and end up with compromised data files. The most common tactic is to make files unreadable or inaccessible and then demand payment in the form of bitcoins to release the originals. In some instances,...

» Read more
Why CFOs and CEOs Should Learn the Agendas of CIOs for Data Resilience
Thumb gfx032

The agenda of the CIO changes each year even if drastically. One of the main things that were eyed in 2015 was hybrid cloud spending, but 2016 has seen business managers focus more on enhancing the power of digital media. According to the Gartner CIO Agenda of 2016, businesses should understand and use the effects of digital platforms in all aspects of the business. 

Those who fail to understand the agenda are more likely to expose their companies to problems that could lead to failure in a number of aspects. For example, failure to understand the need to retain and search for talent...

» Read more
How to detect and prevent Android virus threats
Thumb untitled 6

Detecting and preventing viruses on the android OS

Here’s the bad news. As a programmer, there is more money in taking the Android operating system apart and exploiting it than there is in helping people prevent and detect viruses/malware.

 

Why such a bleak outlook?

Go to Google Play and you will find a chunk of virus/malware detectors for free. People aren’t spending big money on protecting themselves, so companies are not investing big money in protecting people (it’s called economics).

 

How to tell if you have a virus/malware?

You are reading this, so you...

» Read more
Loader