For many years, the accepted security advice has been that using multi-factor authentication and long, complicated passwords with plenty of symbols and digits is the gold standard for password protection. Attacks on accounts that have been compromised have grown by...
“The best defence against cyberattacks is not technological cybersecurity solutions, but rather the strengthening of the human aspect. “– Perry Carpenter, a cybersecurity veteran, author, and chief evangelist-security officer for KnowBe4. According to Verizon’s...
Imagine yourself as a developer who is constantly trying to improve workflows and meet the rising expectations of your company. What if, though, the AI and automation technologies you rely on to do your work more efficiently were to be turned against you? With...
Although unauthorised entry to computer systems is normally prohibited and referred to as hacking, there are several circumstances in which it is permitted and even encouraged. This is where “ethical hacking” comes from. Authorised professionals, sometimes known as...
The digital world – A world where 1s and 0s are used to represent every piece of information and where the average speed of data transmission around the world is less than 100 Megabits per second. It is a world without sleep where anonymity and identity may coexist,...
Major data breaches that jeopardise millions of records frequently make headlines, but an even more serious and sneaky threat—that of the insider—goes mostly unrecognised. An “accidental insider” is a well-intentioned employee who has been duped by rivals or enemies...