The holiday season is a time of celebration, giving, and joy, but it’s also a time when cyber-criminals are more active than ever. With increased online shopping, travel bookings, and social interactions, the opportunities for cyber attacks are abundant. To…
Tag: Cybersecurity Insiders
Email Security in the Remote Work Era
“Is your email safe? Think again.” Every day, we send and receive over 333 billion emails worldwide, with the average employee managing 120 of them daily. But, did you know that 94% of cyberattacks start with a malicious email? In…
Five Canada Hospitals hit by cyber attack, ransomware suspected
Transform, a prominent IT, accounts, and managed service provider dedicated to providing digital support to over five hospitals in Ontario, Canada, is currently under suspicion of being targeted in a cyber attack. Unconfirmed sources suggest that the hospital services have…
Managing Cloud Sprawl: A Key Defense Against Cybersecurity Threats
The adoption of cloud computing has revolutionized the way organizations store, process, and manage data. It offers scalability, flexibility, and cost-efficiency. However, with the benefits come certain challenges. Cloud sprawl is one such challenge that not only impacts an organization’s…
Obtain career boost in 2024 with these 10 cybersecurity certifications
The software industry is in a constant state of flux, and staying competitive requires continuous skill enhancement through the acquisition of the latest and most sought-after certifications. To elevate your career prospects in 2024, consider pursuing one or more of…
Top Five Steps to Elevate Your Data Security Posture Management and Secure Your Data
By Karthik Krishnan, CEO of Concentric.ai October is Cybersecurity Awareness Month, and every year most tips for security hygiene and staying safe have not changed. We’ve seen them all – use strong passwords, deploy multi-factor authentication (MFA), be vigilant to…
Top 3 Priorities for Today’s CISO: Safeguarding the Digital Frontier
Jaye Tillson, Field CTO at Axis Security In an era where cyber threats are evolving at an alarming pace, the role of a Chief Information Security Officer (CISO) has never been more critical. Today, CISOs are the guardians of an…
Email inboxes are vulnerable to sophistication driven cyber attacks
In today’s digital world of communication, a vast amount of information is stored and processed through email communication. This includes sensitive data related to financial transactions, healthcare, professional endeavors, and personal conversations with loved ones. Consider this scenario: a malicious…
Trends to watch at this year’s IoT Tech Conference
The potential of the Internet of Things (IoT) is huge, with connected devices around the world holding the promise of a better, greener and safer future. This makes events like IoT Tech Expo Europe even more important. On the 26th…
Medusa Ransomware Strikes Philippines’ PhilHealth, Demands $300,000 Ransom
In a recent cyberattack, the Philippine Health Insurance Corporation, commonly known as PhilHealth, fell victim to the notorious Medusa Ransomware. This malevolent intrusion has left the government agency grappling with a demand of $300,000 (equivalent to P 17.038 million) to…