Tag: malware
The stealthy attack chain of PDF files – hiding in plain...
Over 400 billion PDFs were opened last year. Adobe Acrobat users alone edited 16 billion documents. Today, more than 87% of organisations rely on PDFs for business communication. This widespread use makes them ideal for hiding malicious code.
Remote work checklist – best practices for a safe home office
Remote work has become a new reality for many professionals. Employees, ranging from designers to accountants, often handle sensitive information, which presents a risk of compromise when operating outside an office environment. To help navigate these challenges, we have compiled a checklist that empowers remote employees to work in comfort while maintaining data security.
How safe is your CEO? A look at ‘whaling’ and ‘spear...
Criminals are launching targeted online attacks against high-value individuals. What can they do to stay safe? Most cyberattacks are opportunistic. Much like a mugging on a dark street, it doesn't matter who the victim is as long as the perpetrators gain something out of their crimes. However, a growing number of these attacks are designed to target specific people, such as CEOs, Directors, Board Members, CFOs, IT administrators, and wealthy individuals.
The hidden dangers lurking in your inbox – stay secure and...
According to estimates by our experts, the average share of spam in global email traffic in 2023 was 45.60%. This deluge of unwanted emails not only clogs up inboxes, but also consumes a significant amount of time and resources. On average, each year, employees spend between 5 and 18 hours sorting through spam, and when scaled to an organisation with hundreds of employees, this translates into huge amounts of lost productivity. Yet, the wasted time is just the tip of the iceberg.
BI & cyber concerns top risks for automotive manufacturing sector
Business interruption (BI) and cyber incidents are the primary concerns for the manufacturing sector within the automotive industry in 2024. The report, based on insights from over 3,000 risk management professionals and business leaders, highlights the growing importance of addressing these risks to ensure business continuity and safeguard against potential disruptions.
Public access Wi-Fi – a costly convenience?
Working from home works pretty well for much of the cloud enabled workforce most of the time. Primarily, a reliable and secure internet connection that builds a bridge between home and the office – perhaps via your organisation’s Virtual Private Network (VPN) – was all that you needed.
Why a timely response is essential and how to achieve it
Advanced persistent threats (APTs) continue to test organisations’ strength by exploiting new vulnerabilities, organising massive supply chain incidents and targeting specific industries. According to one study, 84% of enterprises globally acknowledge that cyberattacks have become more sophisticated.
The new virtual world is more at risk – know the...
Virtualisation in the cloud and the advancement of internet-connected devices have made running industrial systems much more manageable. However, these technologies are also introducing operational environments to new vulnerabilities and risks.
From cybersecurity to cyber immunity – how to achieve it
At the dawn of computer security in the late 1980s, antivirus software emerged as a response to the first malware. Since then, the industry has been playing catch-up, and the challenge for cyber-defence solutions has been to recognise new malware and techniques as quickly as possible and offer the appropriate protection.
‘Coronacriminals’ using phishing attacks
Let us not doubt the fact that cybercriminals are looking to exploit the spread of Coronavirus to conduct cyberattacks and drive hacking campaigns.