Home Tags Cyber Crime

Cyber Crime Related Content

Cyber Crime meaning computer-orientated crime is on the rise. Over the last six years there have been over 3 billion record breaches. Cyber Crimes can be described as actions committed against a group or an individual with criminal motive to intentionally damage the people involved. Regardless of whether you run a business or have a mobile phone, everyone is at risk of a cyber attack. Cyber Crimes that cross the borders of countries and threaten foreign organisations are sometimes referred to as Cyberwarfare.

Forms of Cyber Crimes

These Crimes can come in many different forms most common of which being, Phishing, File Hijacker, Screenshot manager, Hacking etc.
Therefore considering the rapid increase of Cyber Crime, it is essential that cyber security professionals keep updated with development and learning how to prevent and recover from attacks.

 

social engineering

Controlling the top cause of ransomware – social engineering

Javvad Malik, lead security awareness advocate at KnowBe4, explains how social engineering is the top cause of ransomware and explores the steps organisations can take to reduce the risk of attackers gaining a foothold in their networks.
build better cybersecurity  

Why the UK’s public sector needs to urgently build better cybersecurity  

Keith Glancey, Head of Solutions Architects at Infoblox, explores why cybersecurity has never been more important for the public sector.
encryption

Online Safety Bill poses threats to encryption

Robin Wilton, director for Internet Trust at Internet Society, discusses why governments and the private sector pose threats to encrypted communications.
compliance trends

The implications of changing compliance trends on the threat landscape

Nic Sarginson, Principal Solutions Engineer at Yubico, discusses the key regulatory changes in the UK & EU and the pressures being placed on regulators/ policymakers to protect the public from the risks associated with this “new normal".
ransomware within healthcare

The rise of ransomware within healthcare

David Higgins, EMEA Technical Director, CyberArk, explores three reasons why healthcare organisations are extra vulnerable to ransomware.
investigation pegasus software, jamal kashoggi

Investigation reveals Pegasus spyware used to track over 50,000 people

An investigation found that Pegasus spyware, used to track and kill journalist Jamal Kashoggi, has been revealed to be active across the globe - with atleast 50,000 people on the list.
healthcare organisation

How to protect your healthcare organisation from ransomware attacks

Joe Robertson, EMEA Field CISO at Fortinet, explores how ransomware attacks are increasing in healthcare and what organisations can do to protect themselves.
fake clicks

What do we know about fake clicks on Facebook?

Suzanne Trainer, Head of Marketing at Beacon, explains what fake clicks are, why most ad fraud committed on Facebook is click related and provides possible solutions for companies who find themselves falling victim to ad fraud on the social platform.
utilities  

Proactive measures to secure utilities  

Theresa Lanowitz, director, AT&T Cybersecurity, explores the threat of ransomware against utility companies and how they can protect themselves using an offensive cybersecurity strategy.
cybersecurity technologies

5 cybersecurity issues that the public sector faces and how to protect it

Fortinet explores the five top cybersecurity challenges that the public sector is facing and urges those in charge to gain a better understanding of leading cybersecurity technologies and how they work.
dangers of hacking

Keeping your business safe from the dangers of hacking when remote working

Mark Brown, Founder of Psybersafe, explores the dangers of hacking when working from home and offers some advice on how to keep your business safe.
national cybersecurity strategy

Colonial Pipeline: Inherent flaws in the national cybersecurity strategy

Miles Tappin, VP of EMEA at ThreatConnect, explores why the recent Colonial Pipeline ransomware attack has exposed a significant weakness in the US national cybersecurity strategy.
ad fraud

Is ad fraud damaging your brand reputation?

Stewart Boutcher, founding CTO and data lead at Beacon, examines the danger that ad fraud poses, what is being done to combat it, as well as what marketers can do to protect their brand reputations.
confront the threat

SMEs need to confront the threat of ransomware

AJ Thompson, CCO of Northdoor plc, discusses why ransomware is not just an enterprise problem and why SMEs need to confront the threat
cybersecurity threats

Cybersecurity threats to the COVID-19 vaccine

Raymond Pompon, Director of F5 Labs, looks at the cybersecurity threats to the COVID-19 vaccine amid the rise in cyber attacks since the onset of the pandemic.
Cyber insurance

Cyber insurance is no longer a luxury, but a necessity

Aleksander Jarosz, Threat Intelligence Analyst at EclecticIQ, discusses why cyber insurance is a vital investment for businesses as the workplace becomes increasingly digital during the pandemic.
cyber events

CISOs struggle to alert C-suite to cyber threats within their organisation

Miles Tappin, VP of EMEA at ThreatConnect, discusses why it is essential for CISOs to explain to their fellow C-suite executives and board of directors how at risk their organisations actually are from cyber events.
password protection

How to protect your passwords so they can protect you

Christine Sabino, Senior Associate at Hayes Connor, explains why password protection is so important and advises how you can protect your passwords from fraud.
access control system, cyber

Chinese tech: Who really has the keys to your access control system?

Despina Stamatelos at Genetec discusses tensions between China and western liberal democracies, illustrating how this impacts cyber security - do you know who has the keys to your access control system?
managed data and response

Is it time to bolster your cybersecurity with managed data and response?

Tim Bandos, CISO at Digital Guardian, explores what managed data and response (MDR) entails and what the benefits are that it offers.

Follow Open Access Government