Cybersecurity

Google Service Downtime? Check Google Service Status Portal

Google services has become very influential for two decades now, to a point that the world is heavily depending on it for everyday stuff. Services like email, videos, messaging, authentication across many web services and etc are highly dependent on Google working as it should. We can safely say that a downtime of a Google

[ Read More ]

CISO’s Role For Cybersecurity Readiness, Highlighted By Cisco

We are in the paradigm shift when the majority of companies, slowly but surely embracing cloud computing and cloud apps platforms. Cisco’s CISO Benchmark Study 2019 is a global survey participated and represented by 18 countries with 3,200 participants, majority of whom are leaders in the IT field, across many industries from SMEs to multinational

[ Read More ]

Legacy Systems And Cybersecurity, A Difficult Reality

Maintenance and continued use of legacy systems by many corporate entities today make the goal of cybersecurity for the world today a tall order. As organizations are transitioning to new systems, the old systems remain running in order to maintain their clients under their current business model. Of course, the reliability of the old system

[ Read More ]

The “Spoiler” Processor Bug: Is Intel In Trouble Again In 2019?

2018 was a very bad year for microprocessor vendors due to the Spectre and Meltdown bug, but for Intel, it was a nightmare year, worst in its history. The out-of-order execution and branch prediction capabilities of processors were developed in a way that allows timing attacks, which made Spectre and Meltdown take the cybersecurity headlines

[ Read More ]

4 Ways To Address Cybersecurity Gaps For An SME

Multinational and large enterprises have no trouble with beefing-up their cybersecurity defense as those organizations have deep pockets, and a bad incident of a cyber attack can overnight cripple their business and their brands. Unfortunately, in the global scale, it is the SME’s (Small and Medium Enterprises) that employs the majority of the working population.

[ Read More ]

What is Data Integrity? And Steps To Reduce Data Integrity Risk

Over the past few years, Data integrity has become a serious issue and therefore is a core focus of many enterprises. The FDA published a Data Integrity Guidance Document outlining compliance that addresses the role of data integrity for the industry. The document is a result of the FDA increasingly observing violations involving data integrity

[ Read More ]

Hacked Apps Put on iPhones Using Hijacked Apple Technology

Bad news for iPhone users! Apple technology has been hijacked by software pirates and used to put hacked apps on iPhones. Reuters reports that software pirates, using hijacked Apple technology, have distributed hackers’ versions of some popular apps, including Spotify, Angry Birds, Pokemon Go and Minecraft. As per the report from Reuters, illicit software distributors

[ Read More ]

The Four Ways Cyber Security Can Be Improved for SMMEs

Majority of cybercrimes target small to medium and micro-sized enterprises (SMMEs), and research shows that most of these business owners don’t consider it a risk, and the consequence of falling prey to cybercriminals. This is according to Bruce Murphy, Microsoft SA’s OEM Technical Sales – design in strategist, says why more and more unprepared organizations

[ Read More ]

Canadian Banks and Government Institutions Targeted By Foreign Hackers

A leading Cybersecurity analyst tells MPs that foreign hackers have targeted Canadian banks, mining companies, and government institutions to steal information and infect the system with malware. Christopher Porter, the chief intelligence strategist at security firm FireEye, says in February 2017 multiple major Canadian financial institutions were exposed to the risk of state-sponsored cybertheft from

[ Read More ]