cybersecurity

Blog / cybersecurity

How Social Media Changed Cybersecurity

social-media cybersecurity   

The rise of social media has changed the way the internet’s bad actors conduct their operations. Organisations are even more vulnerable due to the plethora of private information that is accessible to those who intend to harm them. (image credit: rawpixel.com) A 2022 survey recorded 39% of businesses in the United Kingdom as cyber-attack victims. Phishing attempts have been marked as the most common form of attacks, with 83% of respondents experiencing these, while more sophisticated attacks such as malware, denial of service or ransomware were also reported.

Cybersecurity Challenges of using Slack for your Business

cybersecurity remote-working employees CISO slack   

With the dramatic shift to remote working we have witnessed during the pandemic, developments in communication and technology have gained momentum. The way we work isn’t the same as it used to be. To keep a collaborative environment even when working from home or wherever employees find themselves most productive nowadays, businesses rely on platforms like Slack. With 8 million plus daily users, the chat system gives teams a convenient and accessible way to communicate.

5 Essential Steps to Secure Your Company's Office 365 Accounts

cybersecurity office365   

The business world has changed more rapidly in the past two years than it has in a decade. The shift to remote work and online business has boosted not just the demand for IT professionals, but the level of cybersecurity awareness we all need to take onboard. Office 365 is a powerful tool for businesses the world over, but that also makes it a gold mine for hackers. Even having an entry-level account compromised can mean serious disruption for your businesses.

Are You the Weak Link in a Supply Chain Attack?

cybersecurity CISO semafore   

Are you the weak link that could lead to a massive cybersecurity breach that could lead to millions of dollars in fines for a company? Doesn’t seem to be a real possibility, right? But the truth is, each of us has the potential to be a gateway to major breaches for our employers, our customers, clients, and suppliers. Or you may not be the direct link - it could be something you trusted to be safe, only it wasn’t.

Good Simply Isn’t Enough

cybersecurity remote-working ciso covid19 employees   

The Hidden Costs of Poor Cybersecurity Measures for Small Businesses Cybersecurity measures for small businesses is a major topic as we head into 2021. It comes as no surprise, given the pandemic, the increasing number of attacks, and various high-profile companies making the news. Zoom came to the forefront of cybersecurity issues when it became known that they didn’t provide end-to-end encryption of customer’s communication. The company reached a settlement with the US Federal Trade Commission for misrepresenting its security features.

Topics

ai atlassian banking best-practices blockchain ciso climate-change cloud counter-measures covid19 crime crypto culture customer-success cybersecurity data-management data-protection data-security development dlp employees gdpr governance identity-theft infrastructure insider-threat malware office365 offshoring phishing privacy remote-working risk-management robotics security semafore slack social-media technology trojan-horse work-experience

Featured

AI vs. Web Developers - Collaboration or Competing?

AI vs Web Developers - Collaborative Innovation or Competing Forces in the Future of Web Development? Artificial Intelligence (AI) has come to the for...

Blockchain Technology & the Future of Cybersecurity

Over the past few years, we’ve been hearing more and more about crypto in emerging markets, digital money, blockchain technology, and other financial...