Tag "Cyber Security Prevention"

Back to homepage
Expert Articles

5 Ways How Big Data Helps to Fight Cybersecurity Threat

By Christopher Roberts – Business Development Manager at Data Entry Outsourced, In the online world where information has become a currency, modern businesses and organizations are required to go through

Expert Articles Software

2019 WordPress Web Hosting Best Practices to Ensure Security

By Andrew Thompson – Bigdropnic.com, While thinking of website hosting, anyone may be concerned about security with the news about some major data breaches even with some of the top

Hardware/Network

Insider attacks still far more difficult to detect and prevent than external cyber attacks

A recent survey conducted by Gurucul of more than 320 IT security experts, found that 15 percent of people said they would delete files or change passwords upon exiting a

Software

Best practices for preventing and recovering from a ransomware attack

How to defend and recover from ransomware attacks.Today’s cyber-criminals are smarter than ever, and it’s likely that we are yet to see the most advanced attacks the world has seen.

Expert Articles

Animation for The Cybersecurity Place: Car hacking methods + prevention tips

Whether or not we realize it, cybersecurity is costing us. On average, malware attacks cost companies $2.4 million and 50 days worth of time — although the amount can be

Industry Insights

Why is Cybersecurity Important?

The internet is everywhere, in our PCs, phones, vacuum cleaners, streetlights; you name it. In fact, it helps keep us and many of the things in our modern world running.

Identity Theft

Before Blaming Hackers, Check Your Configurations

Improving configuration management in Software-as-a-Service (SaaS) applications can minimize the risk of data loss, phishing campaigns and prevent breaches. How can the IT team put up guardrails for users? Click

Software

CYBER SECURITY: HOW TO PREVENT CREDENTIAL STUFFING ATTACKS

Beware of an emerging security threat: Credential stuffing. This involves bots making high-volume login attempts with stolen user credentials to execute catastrophic account hijacking and takeovers. A credential stuffing attack forced

Software

Zero-day attack: An attack that can spread faster than defenders can react

A zero-day vulnerability is a weakness within a computer network or software program that is unknown to the developers.  The term ‘zero-day’ indicates that the developers do not get any

Industry Insights

How can shipping meet the cyber security challenge?

‘Prevention is better than cure’ applies in cyber security as elsewhere, and a panel debate on how cyber attacks can be prevented will form one of the highlights of the Maritime