After the COVID-19 pandemic rendered large portions of a business's operations online, the emphasis on cybersecurity has dramatically increased. A report by Bloomberg Intelligence ably forecasted that spending on cybersecurity is expected to increase by $200 billion a year until 2024. A reason for this growth is stated to have been due to a switch to a cloud-based approach to … [Read more...] about The Rise of Cloud in Cybersecurity
Blog
How much can we rely on digital banking?
Nowadays, there aren’t many activities humans perform without using some form of a computer device. We use computers to talk to people, deliver items to loved ones, and even to keep a check on our bodily functions. As technology is integrated more and more into our daily lives to help make our lives easier, digital banking has emerged as a seamless banking experience that is generally preferred by … [Read more...] about How much can we rely on digital banking?
Colonial Pipeline Forced to Pay $4.4m After Ransomware Attack
Colonial Pipeline became the latest victim of a ransomware attack from threat actors after the company revealed that it paid a ransom worth $4.4 million to DarkSide, the cybercriminal organization that hacked the company. This was done in exchange for regaining access to their servers which had been shut down as a result of the cyberattack. Joseph Blount, the CEO of Colonial Pipeline, … [Read more...] about Colonial Pipeline Forced to Pay $4.4m After Ransomware Attack
The Rise of Ransomware Attacks
The recent events relating to the ransomware attack suffered by the US fuel transportation company, Colonial Pipeline, have alerted the world to the dangers of cybercrime and how no organization is safe from such attacks. Ransomware attacks are on the rise, and businesses worldwide need to understand how destructive they can be and how to protect themselves from suffering the same fate as … [Read more...] about The Rise of Ransomware Attacks
Threat Actors Can Now Hijack Inter-connected Security Systems
Various flaws have been found in internet modules from Paradox Security Systems and researchers claim that these vulnerabilities can be used by cybercriminals to turn off security systems and insert themselves inside the network. Researchers at a cybersecurity company called Critical Security found that the problem lies with the Paradox Security Systems IP150 and IP150+ internet modules. The … [Read more...] about Threat Actors Can Now Hijack Inter-connected Security Systems