Home Search
remote work - search results
If you're not happy with the results, please do another search
Ransomware Operators are Introducing More RaaS Schemes: McAfee Report
The year 2021 is the genesis of many changes in the regular business model. From the new normal of remote working to new attack...
“IoT technology will always improve but it will never be 100% secure”
The proliferation of the Internet of Things (IoT) in consumer, enterprise, and health care sectors, and their internal vulnerabilities, have created a security blind...
Cyber Risk Management: Does cyber risk get enough boardroom airtime?
Cybercrime is not a burgeoning criminal industry; it is an established threat with severe consequences that cannot be ignored by businesses – and it...
Dump the Password! 80% CISOs say They are Not an Effective Means of Data...
Ever since the pandemic began, organizations globally encountered drastic changes in their business operations. The swift adoption of remote working significantly impacted the role...
The Vulnerabilities that Open the Door to Ransomware
The Darkside ransomware group brought the Colonial Pipeline to its knees in May 2021. In another incident that soon followed, REvil (Ransomware Evil), a...
The Edward Don Ransomware Attack – A Reminder of Disruption Caused by Cyberattacks on...
Ransomware attacks targeted towards supply chains in the U.S. have spiraled indiscriminately in the recent past. The incidents are growing by the day, and...
Do Digitally Connected Indians Feel Secure During the Pandemic?
The pandemic has changed our lifestyles in many ways, and the increase in digitalization is one of the major developments. People are digitally connected...
How Communication Service Providers are Keeping the World Connected During COVID-19
The extraordinary value of digital communications has never been more apparent than during the past year. As COVID-19 swept the planet, businesses and individuals...
Top 5 Cybersecurity Trends Businesses Should be Aware of in 2021
2020 will go down in the annals of corporate history as a game-changing year. Even now, as we slowly begin to emerge from a...
Lack of User Verification Policy for Password Reset Could Lead to Social Engineering Attacks
Despite the rise in identity theft across various sectors globally, some organizations are still not maintaining a robust verification process to secure their employee...