Cybersecurity

Legacy Systems And Cybersecurity, A Difficult Reality

Maintenance and continued use of legacy systems by many corporate entities today make the goal of cybersecurity for the world today a tall order. As organizations are transitioning to new systems, the old systems remain running in order to maintain their clients under their current business model. Of course, the reliability of the old system

[ Read More ]

The “Spoiler” Processor Bug: Is Intel In Trouble Again In 2019?

2018 was a very bad year for microprocessor vendors due to the Spectre and Meltdown bug, but for Intel, it was a nightmare year, worst in its history. The out-of-order execution and branch prediction capabilities of processors were developed in a way that allows timing attacks, which made Spectre and Meltdown take the cybersecurity headlines

[ Read More ]

4 Ways To Address Cybersecurity Gaps For An SME

Multinational and large enterprises have no trouble with beefing-up their cybersecurity defense as those organizations have deep pockets, and a bad incident of a cyber attack can overnight cripple their business and their brands. Unfortunately, in the global scale, it is the SME’s (Small and Medium Enterprises) that employs the majority of the working population.

[ Read More ]

What is Data Integrity? And Steps To Reduce Data Integrity Risk

Over the past few years, Data integrity has become a serious issue and therefore is a core focus of many enterprises. The FDA published a Data Integrity Guidance Document outlining compliance that addresses the role of data integrity for the industry. The document is a result of the FDA increasingly observing violations involving data integrity

[ Read More ]

Hacked Apps Put on iPhones Using Hijacked Apple Technology

Bad news for iPhone users! Apple technology has been hijacked by software pirates and used to put hacked apps on iPhones. Reuters reports that software pirates, using hijacked Apple technology, have distributed hackers’ versions of some popular apps, including Spotify, Angry Birds, Pokemon Go and Minecraft. As per the report from Reuters, illicit software distributors

[ Read More ]

The Four Ways Cyber Security Can Be Improved for SMMEs

Majority of cybercrimes target small to medium and micro-sized enterprises (SMMEs), and research shows that most of these business owners don’t consider it a risk, and the consequence of falling prey to cybercriminals. This is according to Bruce Murphy, Microsoft SA’s OEM Technical Sales – design in strategist, says why more and more unprepared organizations

[ Read More ]

Canadian Banks and Government Institutions Targeted By Foreign Hackers

A leading Cybersecurity analyst tells MPs that foreign hackers have targeted Canadian banks, mining companies, and government institutions to steal information and infect the system with malware. Christopher Porter, the chief intelligence strategist at security firm FireEye, says in February 2017 multiple major Canadian financial institutions were exposed to the risk of state-sponsored cybertheft from

[ Read More ]

Cyber Security Is A Culture That Needs To Be Practiced

The biggest weakness of security breaches are the people, but at the same time, they can also be your organization’s biggest defence. The massive telecom data breach, stolen credentials, data compromised are some of the daily issues that we see these days. All of these major breaches resulted from mistakes of individuals. Despite years of

[ Read More ]

Japan Set to Survey 200 Million Gadgets for Cybersecurity

Japan is all set to beef up cybersecurity as the country gears up to host some notable global events. As Japan gets ready to host events like the Rugby World Cup, the Group of 20 meetings and the Summer Olympic Games, Tokyo decides to survey 200 million network-connected gadgets for cybersecurity lapses. The survey starts

[ Read More ]