Another year comes to an end and it’s time once again to assess your IT security. Unfortunately for the CISO, while the rest of the IT team is already dreaming of a white Christmas and pretending to be productive, you need to look back and see if there are any serious reflections that need to […]
Read MoreHow Businesses Can Counter Cyber Threats During the Holiday Season
The holiday cheers extends to everyone including criminal hackers. It’s the season when people are busy swiping their credit cards and/or going online shopping, perfect for opportunistic attacks on unsuspecting consumers and weak IT security systems. The tech world was recently abuzz when UK researchers revealed in their study that it only takes six seconds […]
Read More5 Ways to Manage New Threats in Today’s Cybersecurity Landscape
As technology evolves, so do the security threats that continue to hound IT networks. New vulnerabilities and sophisticated methods are regularly being discovered by experts and IT support teams, many of which are likely being exploited by cyber criminals as soon as they are found. This is because they have better tools, knowledge and expertise […]
Read MoreThe Business Guide to Developing a Cyber Security Incident Response Plan
Remember the 1995 movie, The Net? In the scene post her stolen identity, the protagonist, a computer programmer, says the most unthinkable thing, “Our whole world is sitting there on a computer. It’s in the computer, everything … is stored in there. It’s like this little electronic shadow on each and every one of us, […]
Read MoreHow to Defend Your Business from Insider Threat
Insider threats are like tumors in a person’s body. They can grow and spread undetected until one day, you finally discover the irreversible truth. Fortunately for stakeholders, insider threat does not involve uncontrollable factors and can be prevented before they form. Follow these tips and keep your network services safe.
Read MorePH Ranks 14th in the 2016 ASPI Cyber Maturity Report
Based on the results of the Australian Strategic Policy Institute (ASPI) Cyber Maturity in the Asia-Pacific Region 2016 Report, the Philippines slid down to the 14th spot from 13th the previous year. The report comes close on the heels of cyber espionage incidents growing rampant in many parts of the world over the past few […]
Read More13 Dumb Ways to Get Hacked
The Annual Password List clearly tells us that while hacking has become a normal everyday threat, people make the same mistakes. True, it’s businesses and celebrities who have the more valuable assets than your average Joe. However, we’ve clearly seen from recent data breach cases that criminal hackers can make money from selling or trading user […]
Read MoreHow Criminal Hackers Make Money from Your Data
Every day, businesses handle massive amounts of customer data—so huge that it makes disaster recovery quite challenging for many companies. On the other hand, cyber hackers capitalize on such data to conduct illegal activities. Surely, data is a very powerful instigator of fraud. Data breaches are commonly perpetrated by criminal groups to make financial gains. […]
Read MoreDropbox Data Breach: When Human Error Trumps IT Security
Cybercrime has been making headlines these days, and the most recent of which is the data breach reported on millions of Dropbox accounts. Given the circumstances, companies are reminded again to beef up their IT support to pave the way for better network control and prevent customer data from being compromised. The Threatening Combination […]
Read More5 IT Security Best Practices Against Cyber Bank Heists
Data breach cases in banks are rapidly growing. Cyber bank heists such as the Bangladesh Central Bank case and the data breach in Union Bank of India raised questions about data security in the banking industry. Recently, a sophisticated malware was able to steal more than $350,000 from ATMs in Thailand. Reports of interbank […]
Read More