Analysis
Hidden and Unhidden Costs of Ransomware Attacks
Thumb ransomwarekosten

Ransom is only a small part of the cost that you are likely to incur when hackers attack your enterprise’s computer systems through ransomware. Although some of these costs go unnoticed, customer service interruptions lower businesses’ profitability heavily. But that is not all – read which costs a ransomware attack can mean for your company.

 

Direct Costs 

Most attackers target the enterprise’s data, therefore, leading to data destruction. Consequently, victims may choose to pay the ransom to relieve their captured data. You might even be...

» Read more
Analysis
The value of Intrusion Detection Systems
Thumb intrusiondetectionsystems

Intrusion Detection is a system designed to monitor network traffic for any suspicious activities or known threats. If such anomalies are found, the system will provide information such as the type of suspected attack, the targeted address and where it came from. Intrusion detection systems can be categorized as host-based, if the sensors that detect the threat are placed on a host, or network-based, if the sensors are placed on a network.

 

How an IDS works

The main purpose of an IDS is to detect and report an anomaly, but not to block or stop it. This is in contrast to a firewall or...

» Read more
Study
Is GDPR an inhibition?
Thumb dsgvo hindernis

The General Data Protection Regulation (GDPR) came into effect on May 25, 2018. These are a set of regulations governing how companies in Europe collect and use data they receive from their consumers. It aims at giving consumers more control over how their data is being collected and used. While these regulations aim at making companies more responsible, there are fears that it may hinder innovation.

 

Why GDPR may be a hindrance

GDPR has been on the works for a while. It aimed at updating the Data Protection Directive that came into place in 1995. This means that some of the decisions...

» Read more
Analysis
The Use of AI in IT Security
Thumb ki itsicherheit

Advancements in computing power have seen the rise in the use of AI technologies by organizations as they aim to bolster cybersecurity. AI works by automating complex processes to help detect, analyse and react to security breaches. While the use of AI is increasing, it does not necessary mean that security personnel are no longer needed. Its main aim is to compliment conventional protocols to help organisations better deal with cybersecurity issues.

 

Advantages provided by AI in cybersecurity

Since AI uses Machine Learning, it adapts over time, which makes it easy to deal with the...

» Read more
Analysis
How DNS Hijacking Threatens You Online
Thumb dns hijacking

Normally, when users enter a domain name into the browser, the Domain Name Server (DNS) maps it into its corresponding IP address. A DNS attack occurs when the malware overrides the TCP/IP settings of the system, to redirect queries made to the DNS. The individual behind the attack directs traffic to a website of choice. DNS hijacking occurs in two ways. One method infects computers with malware, rendering it incapable of translating the domain address entered by the user to its matching IP-address. The other method involves hacking specific websites and changing their DNS addresses.

 ...

» Read more
Practical Advice
Dangers of Insider Threats to companies data
Thumb internalthreats

When it comes to cyber security threats, insider threats rank amongst the top culprits. One of the main reasons they are dangerous is because companies give more priority to other frequent threats such as malware attacks, hacking, and ransomware attacks among others. In addition, insider attacks may not be entirely malicious, with most of them being accidental. However, in this age of technological advancement where we are witnessing unprecedented growth in cloud storage, companies face even bigger threats in ensuring their data is safe.

 

How it happens

It can accidentally happen when...

» Read more
Analysis
Crytojacking Won’t Kill Your Computer, but May Wreck Your Nerves
Thumb cryptojacking

Crytocurrencies such as Bitcoin should be familiar to you, but do you know cryptomining? Most importantly, do you realize how it has opened the doors to cryptojacking? If not, this article will provide a surprising overview. 

In a world increasingly greedy for crypto coins, cryptomining is the apex of resource exploitation. It is also arguably the most annoying computer threat ever created, since rather than interfering with your machines for the sake of disruption alone, cryptomining fiends just borrow some of your computing resources – often so discretely that you may...

» Read more
Analysis
Why macOS users should be worried
Thumb apple gera%cc%88te

There is a common myth among many computer users that the Mac operating system is more secure and not prone to viruses. However, this is a dangerous misconception. One of the main reasons why people think this way is not because macOS is more secure than Windows, but because many hackers find it more lucrative to target Windows systems which have a larger market share compared to macOS. Windows accounts for almost 91.76% of the market while macOS only has 6.19%.

 

Malware in macOS

While malware is rare on the Mac, 2012 saw a spike of Malware attacking the system, with 11 new...

» Read more
Practical Advise
These Are The Different Types of Penetration Testing
Thumb pentesting

Penetration testing, pen-testing or ethical hacking are names given to the process of checking the vulnerability of a network, a computer system of a web-based application. In this era where cybercrimes have escalated, systems need to stay guarded and all loopholes sealed. There is no better way to do this other than thinking like a cyber attacker. Pen testing can either be done manually by qualified personnel or automatically by the use of a software application. The following are the different types of pentesting between which you can choose:

 

Targeted Penetration Testing

A...

» Read more
Practical Advise
Creating a Good Disaster Recovery Plan
Thumb urknall

What will you do when your enterprise is suddenly without electricity – for a week? Organization operations may be affected unexpectedly in case unplanned incidences occur. Disasters as such can result from human error, power outages, virus attacks and other causes. It’s the role of the management to set measures to ensure that the business can deal with these tragedies when they occur: A disaster recovery plan (DRP) is a documented approach for strategies to be used as a response in case unplanned events occur. A DRP must have all steps to be followed during such...

» Read more