Home Search

remote work - search results

If you're not happy with the results, please do another search
Compromised Email Accounts

Hackers Exploit Web Application Vulnerabilities to Deploy Malicious Web Shell

0
The U.S. National Security Agency (NSA). and the Australian Signals Directorate (ASD) recently issued a joint security advisory “Cybersecurity Information Sheet” (CSI), which details...
Insider attacker leak data

Insider Threats Rise by 47% in Two Years: Report

0
Several industry experts stressed that insider threats are the primary concern for every security leader, as many organizations fail to address the insiders within...
Ghana Ranks 9th on World Bank’s Vulnerable Countries List in Sub-Saharan Africa

Ghana Ranks 9th on World Bank’s Vulnerable Countries List in Sub-Saharan Africa

0
The World Bank recently ranked Ghana ninth out of 11 countries in Sub-Saharan Africa that are vulnerable to cyberattacks. It is said that South...
Number of IoT Devices Expected to Reach 24.1 Bn in 2030: Report

Could Your IoT Device Get You into Trouble with Data Privacy Laws?

0
We live in an age where privacy is hard to come by. If you go online, you’ve got sites tracking your every move. Even...
Uncertain Data Sharing Practices Keep Educational Organizations at Risk: Research

Webroot’s Report Highlights the Need for Cyber Resilience and Security Education

0
The fourth annual report from Webroot on consumer security behavior across the U.S. revealed that there is a high need to adopt the best...
Cloud Security Risks Rise During the Coronavirus Pandemic: Survey

Cloud Security Risks Rise During the Coronavirus Pandemic: Survey

0
As several organizations are forced to shift to work from home to curb the spread of COVID-19, IT and cloud security professionals are concerned...
SideCopy Malware Campaign

Experts Predict High Demand for Cybersecurity in India Post COVID-19

0
With organizations working remotely, cybersecurity works as a core technology to keep companies secure. The Indian cybersecurity market will witness an increase in the...
Zoom, video conferencing, webinar, zoom two-factor authentication, top data breaches of 2020

Hackers Sell Thousands of Zoom User Account Credentials on Dark Web

0
With millions of office workers now using Zoom from home, opportunistic hackers are stealing their Zoom credentials and selling them on the dark web....
Zoom, video conferencing, webinar, zoom two-factor authentication, top data breaches of 2020

Another Blow to Zoom! Taiwan Government Bans Official Use of Zoom Services

0
The government of Taiwan announced a ban on the official use of video-conferencing platform Zoom. In an official statement, the Executive Yuan stated that...
UK Government, NCSC

NCSC Appoints IASME as the Sole Cyber Essentials Certification Body in the U.K.

0
With a view to streamline the customer experience and improve consistency throughout, U.K.’s  NCSC (National Cyber Security Centre) has announced a partnership with the...