Home Tags Cyber Crime

Cyber Crime Related Content

Cyber Crime meaning computer-orientated crime is on the rise. Over the last six years there have been over 3 billion record breaches. Cyber Crimes can be described as actions committed against a group or an individual with criminal motive to intentionally damage the people involved. Regardless of whether you run a business or have a mobile phone, everyone is at risk of a cyber attack. Cyber Crimes that cross the borders of countries and threaten foreign organisations are sometimes referred to as Cyberwarfare.

Forms of Cyber Crimes

These Crimes can come in many different forms most common of which being, Phishing, File Hijacker, Screenshot manager, Hacking etc.
Therefore considering the rapid increase of Cyber Crime, it is essential that cyber security professionals keep updated with development and learning how to prevent and recover from attacks.

 

prevent data breaches

5 ways to prevent data breaches and cyber attacks

The British Assessment Bureau has compiled a list of 5 preventative measures for organisations to avoid data breaches and cyber attacks.
APT29 cyberattack, russia report

Russia behind APT29 cyberattack on UK vaccine trials

Today (16 July) the UK Government confirmed an APT29 cyberattack, on the UK's COVID-19 vaccine trials and previously the 2019 General Election.
cybersecurity vulnerabilities

How to mitigate cybersecurity vulnerabilities faced in the public sector

Nash Kapoor, VP EMEA at Alsid, discusses the key consideration for local governments looking to protect digital infrastructure from cybersecurity vulnerabilities.
rise of cybercriminals

Remote working and the rise of cybercriminals

Stephen Burke, CEO and founder of Cyber Risk Aware, discusses how organisations can do their own ‘health check’, train their employees in real-time and adopt cybersecurity best practice in the wake of the COVID-19 pandemic.
operational resilience

Reimagining operational resilience in the aftermath of COVID-19

John Beattie, Principal Consultant at Sungard Availability Services, explores how organisations can evolve business continuity plans to adapt for the ‘new normal’ within the workplace.
sexual exploitation

Cybersecurity and child sexual exploitation

Defence and Security Experts Nick Newman and Chris Cole of global innovation and transformation consultancy PA Consulting, discuss how online safety has taken a hit amidst the COVID-19 pandemic and how to work together to end the sexual exploitation of children online.

Cyber Security Services Framework: Managing cyber risk in the NHS

The Cyber Security Services Framework has been developed by NHS Shared Business Services to help protect the NHS and other public sector organisations to mitigate cyber threats.
security strategy

Proactive security strategy for the public sector: Part two

In the second article of this two-part series, Sascha Giese, Head Geek at SolarWinds, shares the final 5 steps that public sector organisations should adopt in order to form a robust security strategy.
cybersecurity issues

Tackling cybersecurity issues in healthcare

Nic Sarginson, Sr. Solutions Engineer for UKI and RSA at Yubico, discusses the cybersecurity issues facing healthcare organisations and how the threat dynamics are expected to change over the coming 24 months.
proactive security

10 steps to proactive security for the public sector: Part 1

In the first article of a two-part series, Sascha Giese, Head Geek™, SolarWinds, shares 5 proactive security methods that public sector organisations should adopt in order to protect themselves against cybercriminals.
procurement fraud

Preventing procurement fraud in local government with the help of machine learning

Laurent Colombant, Continuous Monitoring Solution Manager at SAS, explores the threat that procurement fraud presents to local government, and discusses the anomalies that AI and machine learning should be aware of.
strengthening password security

World Password Day: Strengthening password security

In recognition of this year's World Password Day, five cybersecurity experts have shared their advice for strengthening password security.
cybersecurity management

Gearing up the public sector’s cybersecurity management

John Hurst, Public Sector Sales Director, CyberArk, discusses why the public sector is in dire need to gear up its cybersecurity management.
digital democracy

Dangers of anonymity within a digital democracy

Stephen Ufford, Chairman of the Board at Trulioo, discusses the dangers of anonymity within a digital democracy following an increase in voting-related cybercrime.
5G and IoT

The cybersecurity challenges of 5G and IoT

David Higgins, EMEA Technical Director at CyberArk, discusses how emerging IoT models and the expansion of 5G will open up a number of potential cybersecurity threats.
pandemic response

Drawing parallels between pandemic response and cybersecurity

As cybersecurity experts begin to adapt to remote working, it is worth noting that there are strong parallels between a pandemic response and handling cybersecurity threats. Here, Raymond Pompon, Director of F5 Labs, explains why.
human firewall

Human firewall: How businesses can mitigate against cyber attacks

Stephen Burke, CEO and founder of Cyber Risk Aware, discusses how businesses protect themselves against cyber attacks by building a human firewall.
cyber tips

Top cyber tips for every personality and organisation

John Hackston, Head of Thought Leadership at The Myers-Briggs Company, offers a series of cyber tips and advice aimed at different personality types about their potential cyber security weaknesses.
personal cybersecurity, signal

European Commission: Personal cybersecurity via encrypted messaging

Signal is the messaging app that claims the highest level of personal cybersecurity: Why has the European Commission chosen this over other platforms?
coronavirus news

Cybercriminals take advantage of coronavirus news

Avishay Zawaoznik, Security Research Manager at Imperva, describes the types of spam campaigns designed to spread fake news and the dangers they pose on our understanding of coronavirus.

Follow Open Access Government