cybersecurity
Blog / cybersecurity
Blockchain Technology & the Future of Cybersecurity
blockchain cybersecurity featuredOver the past few years, we’ve been hearing more and more about crypto in emerging markets, digital money, blockchain technology, and other financial terms that have filled our digital platforms — from the articles we read to our social media feeds. While most people tend to associate blockchain with cryptocurrencies such as Bitcoin, the potential use of this innovation goes far beyond that. Image Source One area where blockchain has the potential to revolutionise the way things work is cybersecurity.
How Social Media Changed Cybersecurity
social-media cybersecurityThe rise of social media has changed the way the internet’s bad actors conduct their operations. Organisations are even more vulnerable due to the plethora of private information that is accessible to those who intend to harm them. (image credit: rawpixel.com) A 2022 survey recorded 39% of businesses in the United Kingdom as cyber-attack victims. Phishing attempts have been marked as the most common form of attacks, with 83% of respondents experiencing these, while more sophisticated attacks such as malware, denial of service or ransomware were also reported.
Cybersecurity Challenges of using Slack for your Business
cybersecurity remote-working employees CISO slackWith the dramatic shift to remote working we have witnessed during the pandemic, developments in communication and technology have gained momentum. The way we work isn’t the same as it used to be. To keep a collaborative environment even when working from home or wherever employees find themselves most productive nowadays, businesses rely on platforms like Slack. With 8 million plus daily users, the chat system gives teams a convenient and accessible way to communicate.
5 Essential Steps to Secure Your Company's Office 365 Accounts
cybersecurity office365The business world has changed more rapidly in the past two years than it has in a decade. The shift to remote work and online business has boosted not just the demand for IT professionals, but the level of cybersecurity awareness we all need to take onboard. Office 365 is a powerful tool for businesses the world over, but that also makes it a gold mine for hackers. Even having an entry-level account compromised can mean serious disruption for your businesses.
Are You the Weak Link in a Supply Chain Attack?
cybersecurity CISO semaforeAre you the weak link that could lead to a massive cybersecurity breach that could lead to millions of dollars in fines for a company? Doesn’t seem to be a real possibility, right? But the truth is, each of us has the potential to be a gateway to major breaches for our employers, our customers, clients, and suppliers. Or you may not be the direct link - it could be something you trusted to be safe, only it wasn’t.
Topics
ai atlassian best-practices blockchain ciso climate-change cloud covid19 crime crypto culture customer-success cybersecurity data-protection development dlp employees gdpr infrastructure insider-threat malware office365 remote-working security semafore slack social-media technology work-experienceFeatured
Blockchain Technology & the Future of Cybersecurity
Over the past few years, we’ve been hearing more and more about crypto in emerging markets, digital money, blockchain technology, and other financial...
Attomus Infrastructure - an overview
We are often asked what the Attomus architecture looks like and how internally we approach development and client work and what tools we use. Clearly...