The holiday cheers extends to everyone including criminal hackers. It’s the season when people are busy swiping their credit cards and/or going online shopping, perfect for opportunistic attacks on unsuspecting consumers and weak IT security systems. The tech world was recently abuzz when UK researchers revealed in their study that it only takes six seconds […]
Read More5 Ways to Manage New Threats in Today’s Cybersecurity Landscape
As technology evolves, so do the security threats that continue to hound IT networks. New vulnerabilities and sophisticated methods are regularly being discovered by experts and IT support teams, many of which are likely being exploited by cyber criminals as soon as they are found. This is because they have better tools, knowledge and expertise […]
Read MoreThe Business Guide to Developing a Cyber Security Incident Response Plan
Remember the 1995 movie, The Net? In the scene post her stolen identity, the protagonist, a computer programmer, says the most unthinkable thing, “Our whole world is sitting there on a computer. It’s in the computer, everything … is stored in there. It’s like this little electronic shadow on each and every one of us, […]
Read MorePH Ranks 14th in the 2016 ASPI Cyber Maturity Report
Based on the results of the Australian Strategic Policy Institute (ASPI) Cyber Maturity in the Asia-Pacific Region 2016 Report, the Philippines slid down to the 14th spot from 13th the previous year. The report comes close on the heels of cyber espionage incidents growing rampant in many parts of the world over the past few […]
Read MoreHow Criminal Hackers Make Money from Your Data
Every day, businesses handle massive amounts of customer data—so huge that it makes disaster recovery quite challenging for many companies. On the other hand, cyber hackers capitalize on such data to conduct illegal activities. Surely, data is a very powerful instigator of fraud. Data breaches are commonly perpetrated by criminal groups to make financial gains. […]
Read More5 IT Security Best Practices Against Cyber Bank Heists
Data breach cases in banks are rapidly growing. Cyber bank heists such as the Bangladesh Central Bank case and the data breach in Union Bank of India raised questions about data security in the banking industry. Recently, a sophisticated malware was able to steal more than $350,000 from ATMs in Thailand. Reports of interbank […]
Read MoreThe State of Cybersecurity in the Philippines
The Philippines’ Comelec data breach and its involvement in the Bangladesh heist highlight two important points: the government’s cybersecurity is predictably poor and criminal hackers have become so sophisticated that they can slip and steal cold hard cash across borders. Now that we have knowledge on how disappointing government services can be, it’s now more important […]
Read MoreAuthentication in the Age of Information Insecurity
Authentication, as defined by Wikipedia, is the process of confirming the truth of an attribute of a single piece of data as claimed. In our daily routine, we use authentication even in small ways. The act of putting a key into a lock is a simple form of authentication. By using our ATM cards to […]
Read MoreThe Sequence of a Targeted Cyber Attack
How do cyber attacks happen exactly? According to a recent report, criminal hackers don’t need to rely on malware. They can act like a normal network admin, lurk around a compromised network, and steal your data. Originally it was believed that malware is the weapon of choice by criminal hackers in wreaking havoc on […]
Read MoreThe Promise and Peril with Enterprise Cloud Services
In the 1950s, the mainframe was so big and expensive that organizations could not afford to purchase it. In fact only a few can put up their own mainframe systems for their use. In response, the “time sharing” method was developed, finally enabling multiple users to access data and CPU. This was known as the […]
Read More