Home Tags Cyber Crime

Cyber Crime Related Content

Cyber Crime meaning computer-orientated crime is on the rise. Over the last six years there have been over 3 billion record breaches. Cyber Crimes can be described as actions committed against a group or an individual with criminal motive to intentionally damage the people involved. Regardless of whether you run a business or have a mobile phone, everyone is at risk of a cyber attack. Cyber Crimes that cross the borders of countries and threaten foreign organisations are sometimes referred to as Cyberwarfare.

Forms of Cyber Crimes

These Crimes can come in many different forms most common of which being, Phishing, File Hijacker, Screenshot manager, Hacking etc.
Therefore considering the rapid increase of Cyber Crime, it is essential that cyber security professionals keep updated with development and learning how to prevent and recover from attacks.

 

public key infrastructure (pki)

Can the White House successfully spearhead zero-trust?

Jason Soroko, CTO of PKI, Sectigo, discusses the role of PKI in securing digital identity and implementing zero-trust architectures within the Governmental and public sector arena.
national cybersecurity awareness month

Keep cyber secure this National Cybersecurity Awareness Month

Leading tech experts offer their insight and advice around the evolving threat landscape, problems facing cybersecurity teams, and how companies can bolster cyber defences.
higher education cybersecurity

A class in cybersecurity for higher education

John Hurst, Public Sector Sales, CyberArk, explores the cybersecurity risks that higher education institutions are facing.
IT systems

Waste and inefficiency in outdated government IT systems

Adrian Overall, CEO and Founder of CloudStratex, discusses how the UK government has historically struggled to digitally transform itself and how it can be best be addressed to ensure value for the taxpayer.
Cyber training

Cyber training ‘not fit for purpose’ – We need to change our online behaviour

Mark Brown, Founder of Psybersafe, explores how behavioural science can improve our response to cyber security issues.
cyber attacks in 2021

Education sector suffers series of cyber attacks in 2021

David Cummins, VP of EMEA, Tenable, examines how universities are being targeted by a series of cyber attacks in 2021 and what they can do to protect themselves.
cybersecurity is national security

Cybersecurity is national security for all nations

Yonatan Striem-Amit, Chief Technology Officer and Co-founder, Cybereason, provides insight into why cybersecurity is national security for all nations.
communication and information systems, computing

Computing, communication & information systems

Nina Amla with Joydip Kundu and Fernanda Pembleton from the Directorate for Computer and Information Science and Engineering (CISE), provide an in-depth look at computing, communication and information systems.
safeguard the public sector

How to safeguard the public sector from growing cybercrime

Terry Greer-King, VP EMEA at Sonicwall, offers advice on how can the public sector protect itself from 2021's cybercrime 'explosion'.
social engineering

Controlling the top cause of ransomware – social engineering

Javvad Malik, lead security awareness advocate at KnowBe4, explains how social engineering is the top cause of ransomware and explores the steps organisations can take to reduce the risk of attackers gaining a foothold in their networks.
build better cybersecurity  

Why the UK’s public sector needs to urgently build better cybersecurity  

Keith Glancey, Head of Solutions Architects at Infoblox, explores why cybersecurity has never been more important for the public sector.
encryption

Online Safety Bill poses threats to encryption

Robin Wilton, director for Internet Trust at Internet Society, discusses why governments and the private sector pose threats to encrypted communications.
compliance trends

The implications of changing compliance trends on the threat landscape

Nic Sarginson, Principal Solutions Engineer at Yubico, discusses the key regulatory changes in the UK & EU and the pressures being placed on regulators/ policymakers to protect the public from the risks associated with this “new normal".
ransomware within healthcare

The rise of ransomware within healthcare

David Higgins, EMEA Technical Director, CyberArk, explores three reasons why healthcare organisations are extra vulnerable to ransomware.
investigation pegasus software, jamal kashoggi

Investigation reveals Pegasus spyware used to track over 50,000 people

An investigation found that Pegasus spyware, used to track and kill journalist Jamal Kashoggi, has been revealed to be active across the globe - with atleast 50,000 people on the list.
healthcare organisation

How to protect your healthcare organisation from ransomware attacks

Joe Robertson, EMEA Field CISO at Fortinet, explores how ransomware attacks are increasing in healthcare and what organisations can do to protect themselves.
fake clicks

What do we know about fake clicks on Facebook?

Suzanne Trainer, Head of Marketing at Beacon, explains what fake clicks are, why most ad fraud committed on Facebook is click related and provides possible solutions for companies who find themselves falling victim to ad fraud on the social platform.
utilities  

Proactive measures to secure utilities  

Theresa Lanowitz, director, AT&T Cybersecurity, explores the threat of ransomware against utility companies and how they can protect themselves using an offensive cybersecurity strategy.
cybersecurity technologies

5 cybersecurity issues that the public sector faces and how to protect it

Fortinet explores the five top cybersecurity challenges that the public sector is facing and urges those in charge to gain a better understanding of leading cybersecurity technologies and how they work.
dangers of hacking

Keeping your business safe from the dangers of hacking when remote working

Mark Brown, Founder of Psybersafe, explores the dangers of hacking when working from home and offers some advice on how to keep your business safe.

Follow Open Access Government