Securing human resources from cyber attack

Securing human resources from cyber attack

As COVID-19 forced organizations to re-imagine how the workplace operates just to maintain basic operations, HR departments and their processes became key players in the game of keeping our economy afloat while keeping people alive.

cyber attack/span>

The pandemic had a negative impact on data center operations

The pandemic had a negative impact on data center operations

The effects of the COVID-19 pandemic have resulted in a negative impact on organizations’ ability to manage their storage infrastructures in order to ensure continued access to an increasingly remote workforce and to satisfy health protocols put in place to protect workers, according to StorONE.

pandemic, data center

Huawei to be removed from UK 5G networks by 2027 due to security fears

Huawei to be removed from UK 5G networks by 2027 due to security fears

HUAWEI WILL be completely removed from the UK’s 5G networks by the end of 2027, the Government has announced, following new advice produced by the National Cyber Security Centre (NCSC) on the impact of US sanctions against the telecommunications vendor. Ahead of this there will be a total ban on the purchase of any new 5G kit after 31 December 2020.

security fears, Huawei to be removed from UK

UK authorities and allies expose Russian cyber attacks on Coronavirus vaccine development

UK authorities and allies expose Russian cyber attacks on Coronavirus vaccine development

RUSSIAN CYBER actors are strongly believed to be targeting organisations involved in Coronavirus vaccine development, UK security officials have revealed. The National Cyber Security Centre (NCSC) has published an advisory detailing the activities of the threat group known as APT29, which has exploited organisations globally.

expose Russian cyber attacks, attacks on Coronavirus vaccine

Digital privacy: A double-edged sword

Digital privacy: A double-edged sword


Digital privacy is paramount to the global community, but it must be balanced against the proliferation of digital-first crimes, including child sexual abuse, human trafficking, hate crimes, government suppression, and identity theft. The more the world connects with each other, the greater the tension between maintaining privacy and protecting those who could be victimized.

Digital privacy

Remote working security challenges urge MFA implementation

Remote working security challenges urge MFA implementation


The past few years have seen an increase in employees using personal devices and systems to access work emails and company databases, and exchange valuable information with colleagues, clients, and vendors. These tools can help people complete their jobs but are fraught with security challenges.

Remote working security

The current state of consumers’ cybersecurity awareness

The current state of consumers' cybersecurity awareness


With the second anniversary of GDPR on the horizon, the topic of data security is as pertinent as ever. Despite the proliferation of connected devices and the personal information and sensitive data they harbor, many consumers are unaware of just how susceptible their pocket-sized computers are to cyberattack.

consumers’ cybersecurity awareness, cybersecurity ,

Cybersecurity software sales and training in a no-touch world

Cybersecurity software sales and training in a no-touch world

The pandemic has led to an outbreak of cybercriminal activity focused on remote workers and enterprises that needed to quickly migrate to the cloud to maintain business continuity. More than 3,100 phishing and counterfeit websites were created each day in January. By March, that figure exceeded 8,300. Communication and collaboration phishing sites also grew by 50% from January to March.

Cybersecurity software, training in a no-touch world

European Commission: Still Work to Do on GDPR

European Commission: Still Work to Do on GDPR

The GDPR has successfully met its main objectives but work still needs to be done to improve cross-border investigations, increase regulator resources and address fragmented approaches across the EU, according to the European Commission..

Still Work to Do on GDPR, GDPR

How to protect remote workers from phishing and other attacks

How to protect remote workers from phishing and other attacks


Working from home is a new ‘norm’ for many organizations, but the shift toward remote work has been steadily increasing for the past decade. In fact, between 1996 and 2016 there’s been a 300% increase in the number of companies offering remote work options. Now, of course, it’s mandatory for many of us.

protect remote workers, phishing, attacks

5 Tips for Minimizing Third-Party Risk

5 Tips for Minimizing Third-Party Risk


Outsourcing has become a vital part of most business strategies. Not only is it a way to save money, but it’s a simple way to take advantage of expertise you might not currently have in house. But outsourcing can also leave companies vulnerable if the third-party doesn’t have proper cybersecurity procedures.

Minimizing Third-Party Risk

Five signs a virtual CISO makes sense for your organization

Five signs a virtual CISO makes sense for your organization


As today’s threat landscape continues to feature more sophisticated, well-funded, highly organized and increasingly complex cyber adversaries, defense and remediation strategies have become much more challenging. Protecting an enterprise and preparing for current and future threats requires a great deal of expertise, planning and timely and targeted actions.

Virtual, CISO, organization

Passwords still widely used, despite known weaknesses

Passwords still widely used, despite known weaknesses

Nearly a third (29%) of organizations in Europe and the Middle East still see usernames and passwords as one of the most effective means to protect access to their IT infrastructure, two years after the inventor of the complex static password admitted they don’t work, according to Thales.

Passwords, weaknesses

The state of data quality: Too much, too wild and too skewed

The state of data quality: Too much, too wild and too skewed

We live in the age of data. We are constantly producing it, analyzing it, figuring out how to store and protect it, and, hopefully, using it to refine business practices and better understand the markets and customer we work with. However, this is all easier said than done and one of the biggest concerns that businesses have around their data is the quality – a fact confirmed by 1,900 people surveyed at the end of last year on the state of data quality. Despite being aware of data quality issues, many are uncertain about how to best address those concerns.

data quality

The Biggest Cybersecurity Mistakes CISOs Might be Making Today

The Biggest Cybersecurity Mistakes CISOs Might be Making Today

As more organizations move to the cloud, the need for airtight security has become paramount. As threats evolve and become more sophisticated, mitigating hacks and malicious attacks has become very difficult. And for many Fortune 1000 CISOs, some still believe that managing their security in-house or on-premise is safer and more cost-effective—when the opposite can very well be true.

Cybersecurity Mistakes, CISOs

21% of SMBs Don’t Have a Data Backup or Disaster Recovery Solution in Place

21% of SMBs Don't Have a Data Backup or Disaster Recovery Solution in Place

New research (…) indicates that 58 percent of C-level executives at small and medium businesses (SMBs) said their biggest data storage challenge is security vulnerability. Nearly half (49 percent) of top leaders at SMBs said cyberattacks are their biggest data protection concern. Yet more than 20 percent of SMB leaders said they do not currently have a data backup or disaster recovery solution in place.

SMBs Don’t Have a Data Backup, Disaster Recovery Solution, data protection, cyberattacks

Nearly 60% of Security Professionals Trust Cybersecurity Findings Verified by Humans over AI

Nearly 60% of Security Professionals Trust Cybersecurity Findings Verified by Humans over AI

New research revealed that while over half of organizations use artificial intelligence (AI) or machine learning in their security stack, nearly 60 percent are still more confident in cyberthreat findings verified by humans over AI.

security professionals, artificial intelligence (AI), cybersecurity, Cybersecurity Findings Verified by Humans over AI

Hacking has become a viable career, according to HackerOne

Hacking has become a viable career, according to HackerOne

HackerOne announced findings from the 2020 Hacker Report, which reveals that the concept of hacking as a viable career has become a reality, with 18% describing themselves as full-time hackers, searching for vulnerabilities and making the internet safer for everyone. Not only are more hackers spending a higher percentage of their time hacking, they’re also earning a living doing it.

Hacking, career

Do your employees feel valued? 64% have one foot out the door

Do your employees feel valued? 64% have one foot out the door

The estimated current cybersecurity workforce is 2.8 million professionals, while the amount of additional trained staff needed to close the skills gap is 4.07 million professionals, according to (ISC)2. This makes retaining employees a top priority, but how can companies be successful at this?

employees, valued

Data Privacy Day 2020: Five Learnings from the Past

Data Privacy Day 2020: Five Learnings from the Past

This Data Privacy Day 2020, we urge individuals and organizations around the world to learn from the fallout of the mega-breaches of the recent past. We provide five positive steps that companies around the world can take to better protect consumers, employees and more.

Data Privacy Day, GDPR, data privacy

5 Tips on How Companies Can Prepare for Cyberattacks and Data Breaches

5 Tips on How Companies Can Prepare for Cyberattacks and Data Breaches

Benjamin Franklin once said, “By failing to prepare, you are preparing to fail.” These sage words unfortunately describe the dilemma many companies are facing on a daily basis with increasing frequency. Whether because of a lack of resources to commit to cybersecurity or the C-suite’s reluctance to do things differently, companies are suffering from a rash of bad actors seeking to profit from cyberattacks and the loss of data because of negligent handling by insiders.

How Companies Can Prepare for Cyberattacks, Data Breaches, cybersecurity, cyberattacks

A Resilient Answer to Disasters

A Resilient Answer to Disasters width=

The Second Law of Thermodynamics tells us that the total entropy can only increase over time for an isolated system. In other words, contrary to what we may believe or may simply hope, things fall apart. It’s not an accident. It’s a law of physics, and its awful simplicity is clear and frightening.

Resilient Answer to Disasters, disaster recovery, business continuity

How to Achieve Cybersecurity with Patience, Love and Bribery

How to Achieve Cybersecurity with Patience, Love and Bribery

Your five-year-old hears the doorbell ring just after you’ve jumped in the shower. They’ve been trained by your example to answer the door when they hear the bell, but are a bit too young to have had the “never answer the door unless I’m with you” talk. The man at the door is dressed in a sharp uniform that says Acme Repair (meep meep). Your child doesn’t read yet, but they recognize an authority figure when they see one (thanks Wile E Coyote), and let him in when he says, “Your mom called to have the heater fixed.”

How to Achieve Cybersecurity, data breaches, cybersecurity