For some, it occurred when Russian tanks crossed the Ukrainian border after assurances that they were merely conducting training maneuvers. For some it occurred when Russian military deliberately targeted civilians. For some it was the shelling of a maternity hospital or a Mariupol theatre with дети displayed outside. For some it was the false flag setup for chemical weapon attack or the reckless shelling of nuclear facilities. Putin has crossed his Rubicon.
Deepfake – fake news on steriods
Using Photoshop to alter images to make the subject look thinner, healthier or more attractive, has become so endemic that the word has entered the lexicon as a verb, adjective and noun. Advancements in AI, specifically deep learning using artificial neural networks, have taken this activity to a potentially more harmful level. Last season’s liposuction of bimbo belly fat has become this season’s complete head transplants of politicians and celebrities. Continue reading
What does the ‘hybrid workplace’ mean for cyber security?
The hybrid workplace is becoming the new buzzword as companies look towards the coming months. Enabling employees to work some of the time remotely, and some of the time in the office seems like a sensible approach. But while it minimises Covid risks, the question we should be asking, is whether it might expose organisations to greater risks from cyberattacks. Continue reading
New Year, Heightened Cyber Risks
For all of us the idea that we close 2020 and start 2021 afresh is appealing. But it will not happen. The impact of Covid-19 will reach into the New Year, even as we pin our hopes on a vaccine. And in the cybersecurity world, we are now preparing for an onslaught of new and inventive attacks that prey on these hopes and bring further challenges for individuals and for companies. Continue reading
Manage endpoints to protect the weakest link in the security chain
What do we understand by endpoints? Traditionally, an endpoint was any device connected to the LAN or WAN such as a workstation or end-user PC, a modem, a hub or a switch. Now endpoints incorporate a multitude of additional digital devices from laptops, tablets and mobile phones sitting on the edge of the network, to network printers, consumer and industrial IoT devices and point-of-sale systems. Securing this ever-expanding portfolio has become urgent because these devices represent a significant risk to the cloud ecosystem and the global enterprises that are on or moving towards it.
Equipping remote call centre agents to protect customer data
The challenge for call centres over recent months has been how to balance the safety of employees and support them working remotely, with a lack of access to secure systems that could connect them to customer files, policy documents, and payment processes.
Financial Services data is at risk from attacks on unprotected endpoints
The past month has seen some organisations asking their employees to return to work while others are encouraging teams to stay at home and continue to work remotely. Continue reading
Protect the chain as data flows from the keystroke to the cloud
Data is at risk from the second that a key is pressed on an endpoint to the point when it reaches the corporate cloud and is stored. In fact, the most vulnerable point in the entire process is at the very beginning when the user presses a key, and this is where protection needs to be prioritised.
Remote workers face onslaught of malicious cyber threats
At the beginning of the Covid-19 crisis, I predicted that cyberattacks would increase by 30-40%, and it gives me no pleasure to see this happening before my eyes. We carried out a survey in the latter half of April amongst 1550 UK employees working remotely due to the crisis which found that 42% had received suspicious emails and 18% had already tackled a security breach since lockdown began. Continue reading
Never has a security blanket been more needed
For those that can, remote working is becoming the norm as we learn to adapt to restrictions imposed by the coronavirus crisis. But while we take measures to protect ourselves physically, when it comes to protecting ourselves and the businesses we work for, or manage, from cybercrime, the battle is only just beginning.