In the context of the major health crisis caused by the novel coronavirus (COVID-19), that our planet is going through, hackers and cybercriminals are trying to take advantage of the situation to attack the impacted companies and exploit their vulnerabilities, particularly those caused by teleworking. A great number of companies…
Tag
Cybersecurity
A CYBERSECURITY PERSPECTIVE FROM DR. IZUAKOR, A CYBERCULTURE HACKER What does leadership mean to you from a cybersecurity perspective? When it comes to cybersecurity, it seems as though there is always a fire to fight. Whether it is a new vulnerability impacting the company, the risk of failing an audit,…
It is incorrect to presume that only large organizations need to manage risk. The size of the organization is not a factor when it comes to dealing with risk; all organizations are responsible for ensuring the availability, integrity, and confidentiality of the assets entrusted to them by their clients. Therefore,…
Tips from a high-level government executive on ransomware protection. …
Incident management and business continuity are an integral part of every successful company. The ability to survive an incident, continue operations during the event, and not stop growth after the incident is the definition of an organization with a vision! …
The aim of this Privacy Framework is to improve privacy risk management between business/mission drivers and privacy protection activities. It is intended for organizations that use data processing systems, products or services irrespective of their sector, focus or size. …
IoT promises to be an extraordinary revolution in our day-to-day life. But how will we respond to the new cybersecurity and privacy threats that this new technology poses? What standards do we already have in place, and where is the global security discourse situated regarded this matter? …
Estonia is known as a pioneer in building e-country solutions. Some examples are e-government solutions, e-identity, e-voting, etc. My intention is to add to this list cybersecurity-related solutions, based on the fact that Estonia holds the number one position on the National Cyber Security Index (NCSI) ranking. I am not…
What we refer to as Cyberspace is in fact the totality of interactions between people, services, software etc. on the Internet. Cyberspace as such, does not exist in any physical form, and thus it is often perceived as this abstract notion which signifies processes, actions and platforms, exchanges and online…
A politically inclined attack or just a ‘simple’ lack of security awareness? Whatever the case, the cyber-attack that hit Marriott was huge. This was the joint second largest data breach to take place, after Yahoo in 2013 and Equifax in 2017. A cyber attacker stole personal information including names, emails,…