The security community is warning users of smartphones that hackers are developing fake COVID-19 apps that load ransomware on devices. These apps claim to provide information relevant to the COVID-19 outbreak but in reality, malware is installed onto the device.
It is often months before an organisation realises that a cyber-security breach has occurred. In this article, we discuss 5 important steps to recover from a cyber attack or a security breach.
Cyber security threats and trends A host of new and evolving cyber security threats has the information security industry on high alert. Ever-more sophisticated cyber-attacks involving malware, phishing, machine learning and artificial intelligence have placed the data and assets of… Read More »Cyber Security Top Threats and Trends
1. Cybersecurity Concerns and Challenges The digital and physical world share some dark similarities. One of the main ones being the abundance of people who have been out to steal business-critical data. Hackers continually hunt for exploitable targets. There are… Read More »6 Cyber security Concerns for Small Business