IMG_3291

Let’s talk about the key to IoT security – Lessons from the Biggest Thing in the IoT

It’s no a mistery that Internet of Things networks have a security problem. There have been a regular stream of articles regarding large-scale attacks carried out by infiltrating wireless IoT devices as a back door into companies networks. Probably one of the best known is the 2016 – Mirai attack, which turned IoT devices into a real zombies army that paralyzed processes of such companies like Netflix[…][…]

Top Cloud Computing Tips for Small Businesses

Cloud computing has seen incredible steps forward in the last 10 years and unsurprisingly, that means the adoption rates within small to medium sized industries has soared. However, like all aspects of IT, cloud computing doesn’t stand-still and understanding how to leverage the technology for maximum effect is often outside the knowledge based of company owners and decision[…][…]

IMG_3295

The 7 Basic Principles of IoT Security

Most probably you have heard or read various articles about the impending doom from the proliferation of weakly secured “Internet of Things” stuff. IoT contains everything from security cameras, routers and digital video recorders to printers, wearable devices and “smart” lightbulbs – loosely defined as any gadget that connects to the Internet but which most of you[…][…]

IMG_3287

Top IoT predictions for 2018 and beyond

5 IoT predictions for 2018 and beyond Progression in IoT security, interoperability and its convergence with Cloud, AI, mobility, big data processing, cognitive computing and other emerging technologies will make the new year a pivotal one for IoT. The Internet of Things has moved to the mainstream in enterprises across all industries and this year will likely[…][…]

IMG_3428

Forget gadgets for now: staying safe is equally important as having the latest devices and services at your disposal

Forget gadgets for now: staying safe is equally important as having the latest devices and services at your disposal. Cybersecurity, cyber-terrorism and cyber defense are serious topics of concern for all industries, government agencies, energy and national infrastructure entities. Securing the information systems, data and infrastructure of these Governmental, Military and Commercial assets is paramount[…][…]

IMG_3773

Global cybersecurity trends for 2018

Global cybersecurity trends for 2018 Artificial intelligence You must invest in machine learning and artificial intelligence. It’s no longer a ‘nice to have’, it needs to be a core component increasing the ability to identify and combat the most massive infiltrations the industry will face in the years to come. Systems should alert about any deviations and anomalies in real time.[…][…]

IMG_3285

For many IoT devices, security is often not a consideration at all

For many IoT devices, security is often not a consideration at all Many IoT devices are built with convenience in mind and security is often not a consideration at all. Consumers often tend to care more about price, aesthetics and functionality than privacy protection when making purchasing decisions. Many research suggests they show relatively little concern about the[…][…]

image1[1]

Cyber Security in SME

It’s easy for SME to trick itself into thinking the cyber threats that only apply to large enterprises. But remember, in the eyes of attackers, bigger may not be better. Bigger businesses often have stronger security programs, larger budgets and more staff, making them less attractive targets for attackers than mid-market companies.  Understanding risk in SME is[…][…]

IMG_3610

Cyber threats continue to grow as the technology changes rapidly

Cyber threats continue to grow as the technology changes rapidly. Remember, one of the best investments you can make is in your cybersecurity people. With the right talents, you’ll have a far better chance of successfully fending off attacks, protecting your organization and outdoing your competition. Take your time when searching. Look for people with real-world experience.[…][…]

24

Many CIOs are confronting the same cybersecurity questions

It’s the middle of the intense Q4 budgeting season and many CIOs are confronting the same cybersecurity questions how to fight an enemy that constantly changes its tactics. Only doubling down on training, threat detection analytics, response and perimeter defenses are the wisest options. Detection and response are at least as important as prevention. Four of[…][…]

IMG_3298

Cybersecurity is a responsibility among all stakeholders

Cybersecurity is a responsibility among all stakeholders and it is yet another wake-up call to become smarter than criminals, increase cyber resilience and design systems and teams to prevent attacks. How to shore up defenses? 1. Install the latest updates for your systems by enabling automatic downloads during downtime or off-peak hours. 2. Check that your system doesn’t have any[…][…]

Good morning text with holiday gear businessman and blackboard with text

Why do security practices consistently fail if we now have more tools available than ever

Why do security practices consistently fail if we now have more tools available than ever? I am sure if we transform our approach to training, we can more efficiently build a highly skilled cybersecurity workforce that is better prepared to address emerging threats in complex environments. The cybersecurity training must be agile enough to adapt to emerging threats. It should engage users in realistic environments[…][…]