Archive for February, 2017

What is a Cyber Security Definition?

What is a Cyber Security Definition?

A cyber security definition has some value in terms of giving clarity to a potential problem that is in part understood by people in businesses and organisations, but has historically been to a large extent ignored by many. This ignoring of cyber security has often been in the same mindset as people ignoring the need […]

How to develop a Cyber Insurance Plan

How to develop a Cyber Insurance Plan

A cyber insurance plan is a key element of survival almost, for any individual or organisation who uses the internet as part of their business or personal life. Such a plan can literally involve cyber insurance, either as a specific cyber insurance policy, or as part of a liability policy such as product liability or […]

What is an IoT Platform

What is an IoT Platform

In order to understand an IOT platform, it is first necessary to understand what IOT means, both literally and in terms of its implications for the future world, both business and personal in the next five or 10 years. IOT stands quite simply for the Internet of things. This is a phrase that has been […]

What is Credit Monitoring?

What is Credit Monitoring?

Credit monitoring is widely associated with the process of credit reports and credit scores, and normally with the process of a loan application for a new car or a mortgage. It has also been loosely associated with the process of identity theft, not so much as a preventative measure but as a way of helping […]

What are main Cyber Threats?

What are main Cyber Threats?

Cyber threats of various descriptions have been around pretty much since people started using the Internet with any degree of continuity, and most people are aware of the various terms such as viruses, email viruses and Trojan horses. They may not know exactly what they mean, and they only have experienced them when some frightening […]

BEST INTERNET SECURITY

BEST INTERNET SECURITY

The best Internet security approach is undoubtedly a combination of three main things, sometimes referred to as the three S’s, staff, structure and systems. Whatever the size of the organisation or business, whether it is one person with a website or a business with thousands of employees, the threats or cyber risks to the organisation […]

INTERNET of THINGS and BYOT

INTERNET of THINGS and BYOT

‘According to Gartner, the IoT will be a ‘long tail’ domain, with ‘things’ ranging from automotive subsystems and security cameras to Bluetooth beacons, smart garments, agricultural crop sensors and many more. In the near term, ‘consumerization’ will play an important role, and all sorts of smart devices will find their way into businesses, causing headaches […]

COMPANYS FEAR GLOBAL CYBER ATTACK

COMPANYS FEAR GLOBAL CYBER ATTACK

“Cyber-attacks and data breaches continue to cost organizations billions of dollars annually, a sum that is only likely to go up with the increasing integration of new pieces of technology into daily operations,” BCI Executive Director David Thorp said in the foreword to the report. “Politics too has been a dominant topic this year, certainly more […]

MEDICAL DATA MOST AT RISK

MEDICAL DATA MOST AT RISK

‘Medical insurance identification, medical profiles, and even complete electronic health record (EHR) databases have attracted the eyes of enterprising black hats, who increasingly see EHR-related documents as some of the hottest commodities peddled in the criminal underground. A new report today shows that complete EHR databases can fetch as much as $500,000 on the Deep […]

SOCIAL NETWORK FRAUD

SOCIAL NETWORK FRAUD

‘Fake promoted ads are another trend to watch, he continues. Impostors create ads prompting users to click through to a malicious site. This was surprising, he continues, because social platforms typically require a vetting process for promoted ads. Impersonators can bypass the vetting process by using real brand logos and similar-looking merchandise. The creation of […]