Home Blog Page 92
The number of threats that our mobile devices encounter increases every year and the risks from mobile malware has a large share in it. Research from Check Point revealed that every organization has encountered at least one mobile-related attack...
With the rapid pace of digitalization, businesses are increasingly exposed with more attack surface for cyber criminals to compromise their private data and networks. SPONSORED CONTENT Traditional methods of deploying on-premise cybersecurity cannot with this changing demand. For improved responsiveness to...
It’s been over a year since the first COVID-19 death was reported in the state of Karnataka, India, in March 2020. With concerns of high mortality rates from the global pandemic, the government of India announced strict lockdowns to...
The National Security Agency (NSA) informed Microsoft about four critical vulnerabilities that could be exploited by attackers to compromise Microsoft Exchange Servers remotely. The vulnerabilities CVE-2021-28480, CVE-2021-28481, CVE-2021-28482, and CVE-2021-28483 are present in 2013, 2016, and 2019 versions of the Exchange Server. If...
Global Median Dwell Time (defined as the duration between the start of a cyber intrusion and when it is identified) has been reducing over the past decade. For the first time, it has dropped below one month. Today, organizations...
Research has pointed out that nearly 80% of organizations have faced some sort of security breach due to identity-related issues, even here nearly every single participant of the survey (99%) believed that the incident could have been prevented had...
Stories about data leaks from social media sites surface with alarming regularity these days. And it’s not just social media. Stock exchanges, credit card companies, banks, payment processors, airline companies, and other businesses have also experienced data breaches --...
The dust of the MobiKwik data breach was just beginning to settle as another data breach takes center stage. This time it is India’s second-largest stockbroker, Upstox. Out of the total user base of nearly three million users, reportedly...
In turbulent times organizations need to focus on business priorities and restructure processes and teams. How should security leaders set their priorities and how do they tackle the security incidents at scale – even as security budgets remain flat?...
One cannot ignore the importance of a strong password while improving security online. Using hard-to-guess passwords or passphrases provide optimum security to your devices and online accounts. However, despite several security awareness programs, users fail to form strong passwords,...