Home Search

COVID-19 - search results

If you're not happy with the results, please do another search
Cybersecurity is standard business practice for most large companies: Survey

Shadow IT is Creating an Ever-growing Problem with Remote Teams

0
Most organizations have a centralized IT department with the apps and software approved for certain activities. However, remote workers might choose to find other...
cybersecurity

ICS is Becoming a Hot Favorite of Threat Actors: Kaspersky Report

0
ICS (Industrial Control System) or SCADA have faced large volumes of attacks from notorious threat actors in the recent past. Be it the China-linked...
reasons for data loss, data loss, data breach, world backup day

This “World Backup Day,” Let’s Look at the H.O.L.I.S.T.I.C. Reasons Behind Data Loss

0
Imagine one morning you wake up and check your mobile phone for emails and messages and you notice that there is no new data...
Zoom, video conferencing, webinar, zoom two-factor authentication, top data breaches of 2020

Zoom’s Video-teleconferencing Platform Still at Risk: FBI Warns

0
Despite regular security updates and features, cyberthreats on Zoom applications have become rampant. In the wake of the pandemic, the popular video conferencing platform...
World backup Day

Pledge to Backup Your Data This World Backup Day

0
Information is new money in this modern digital world. Everything revolves around information, and it has become the fuel for many businesses. For instance,...

“Build a more robust pipeline for cyber talent”

0
It has been an age-old myth that women prioritize family over work. Women are under-represented in tech and leadership. According to an (ISC)² Cybersecurity...

“I personally believe girls are naturally blessed analysts and can make great research scholars”

0
COVID-19 has changed the ways businesses operate today. Like health care and banking, cybersecurity was one of the most impacted industries with phishing and...
endpoint security

Why Zero Trust Model is a Top Priority for Security Leaders Today

0
Ever since the pandemic hit, companies globally are trying to progress their digital capabilities and rapidly undertaking business transformation initiatives. Despite the revenue declines...

For many roles, there are few, if any, women candidates

0
It has been an age-old myth that women prioritize family over work. Women are under-represented in tech and leadership. According to an (ISC)² Cybersecurity...
Threat Alert! Attackers Use Malicious Email Accounts to Launch BEC Attacks

Five Social Engineering Trends to Watch for 2021

0
Cybercrime continues to be a growing threat and attack methods constantly evolve with each passing day. At the core of almost every successful cyberattack,...

MOST POPULAR

RECENT POSTS