Insider threats are like tumors in a person’s body. They can grow and spread undetected until one day, you finally discover the irreversible truth. Fortunately for stakeholders, insider threat does not involve uncontrollable factors and can be prevented before they form. Follow these tips and keep your network services safe.
Read MorePH Ranks 14th in the 2016 ASPI Cyber Maturity Report
Based on the results of the Australian Strategic Policy Institute (ASPI) Cyber Maturity in the Asia-Pacific Region 2016 Report, the Philippines slid down to the 14th spot from 13th the previous year. The report comes close on the heels of cyber espionage incidents growing rampant in many parts of the world over the past few […]
Read More13 Dumb Ways to Get Hacked
The Annual Password List clearly tells us that while hacking has become a normal everyday threat, people make the same mistakes. True, it’s businesses and celebrities who have the more valuable assets than your average Joe. However, we’ve clearly seen from recent data breach cases that criminal hackers can make money from selling or trading user […]
Read MoreDropbox Data Breach: When Human Error Trumps IT Security
Cybercrime has been making headlines these days, and the most recent of which is the data breach reported on millions of Dropbox accounts. Given the circumstances, companies are reminded again to beef up their IT support to pave the way for better network control and prevent customer data from being compromised. The Threatening Combination […]
Read MoreThe State of Cybersecurity in the Philippines
The Philippines’ Comelec data breach and its involvement in the Bangladesh heist highlight two important points: the government’s cybersecurity is predictably poor and criminal hackers have become so sophisticated that they can slip and steal cold hard cash across borders. Now that we have knowledge on how disappointing government services can be, it’s now more important […]
Read MoreThe Sequence of a Targeted Cyber Attack
How do cyber attacks happen exactly? According to a recent report, criminal hackers don’t need to rely on malware. They can act like a normal network admin, lurk around a compromised network, and steal your data. Originally it was believed that malware is the weapon of choice by criminal hackers in wreaking havoc on […]
Read MoreThe Latest Effective Phishing Techniques Targeting Retail Businesses
Despite its prevalence, phishing is not a tale as old as time. In fact, these email scams originated around 1995 but has taken 10 years before common folks knew what it meant. A play on the word “fishing,” phishing is the act of sending an email to a person claiming to be a legitimate enterprise. […]
Read MoreThe Top Causes of Data Breach that You Need to Prepare for in 2016
Like what Johnny Mnemonic has shown us more than a decade ago, data will be the currency of a digitally connected world. The film was a total flop, but it did foretell an important insight – the value of data in a dystopian world ruled by mega corporations (you know, like Google and Facebook). […]
Read MoreIT Security: How Philippine Banks Can Mitigate Cyber Attacks
Data breach cases are gradually becoming a dime a dozen. While the most expensive breaches we’ve known so far are from the big companies in the US, that doesn’t mean the Philippines is safe. While the once “sick man of Asia” has made economic leaps thanks to the exponential growth of the offshore outsourcing industry, […]
Read More5 IT Security Lessons from the Comelec Data Breach
Dire consequences are always at stake, especially when IT security is concerned. Hacking and other cybercrime attacks have the ability to shut down an entire system for a day, causing businesses to halt their operation. In line with this, huge costs can be incurred whenever a cyber attack happens. But, among these consequences, it is […]
Read More