Home Blog Page 97
Despite regular security updates and features, cyberthreats on Zoom applications have become rampant. In the wake of the pandemic, the popular video conferencing platform suffered numerous cyberattacks and is still a primary target for many cybercriminal gangs. The company...
Information is new money in this modern digital world. Everything revolves around information, and it has become the fuel for many businesses. For instance, the business of social networking platforms like Facebook and Twitter is reliant on consumer data. Despite...
It has been an age-old myth that women prioritize family over work. Women are under-represented in tech and leadership. According to an (ISC)² Cybersecurity Workforce Report, women working in cybersecurity account for about one quarter (24%) of the overall...
India has been planning to ban cryptocurrency for the past few months by introducing a bill against it in the parliament citing concerns over its privacy and rise in unaccounted digital assets. This is seen as a rather surprising...
Whether it is a discount or inadvertent deduction, getting a refund is always a delight for everyone. But what’s unbelievable is receiving the same refund from the one who robbed you.  In an unusual scenario, ransomware operators announced that...
Over a century ago, the U.S. Congress sanctioned the 19th Amendment (Amendment XIX), which prohibits the states and federal governments to discriminate and deny the right to vote to U.S. citizens on account of gender/ sex. The success of...
COVID-19 has changed the ways businesses operate today. Like health care and banking, cybersecurity was one of the most impacted industries with phishing and ransomware attacks at an all-time high. The pandemic also negatively influenced the workforce shortage trend,...
There are necessary and important data security needs in the nation’s public sector critical infrastructure services, such as water and wastewater treatment facilities, transportation, chemical, and energy sectors. Data security is to protect against intelligence gathering, distribution, maleficence against...
Cybersecurity projects are often balked at because businesses rarely realize the value of their data. For many organizations, data is something that accumulated over years of operations but is seldom looked at as an asset. So, getting approval for...
The top three identified obstacles to cyber insurance adoption remain “not understanding exposures” (73%), “not understanding coverage” (63%), and “cost” (46%), according to Advisen’s 2019 Cyber Insurance Market View survey. These obstacles are quite similar to general insurance obstacles...