Do you want to know how to secure your Internet of things security? A smart home that opens on its own as soon as you stand in front of the door, lights that turn on with the snap of your fingers, a connected watch, or even bracelets that alert you to non-compliance with your diet. Do you feel like you’re in a science fiction movie? And yet, all of this is now made possible by new smart technology trends, otherwise known as the Internet of Things (IoT). Yet high-level attacks, coupled with a lack of knowledge about security practices and associated…
Author: Usama Amin
Since at least 2017, the number of ransomware attacks against industrial companies and Operators of Vital Importance (OVI) has increased significantly. WannaCry, LockerGoga, MegaCortex, Ryuk, Maze, and SNAKEHOSE (also known as Snake / Ekans): these ransomware names are only too well known and have cost victims from many sectors millions in ransoms and collateral damage. These incidents have also greatly disrupted and slowed down the physical processes that allow these companies to produce and deliver goods and services. Much has been said about the victims and the immediate consequences of ransomware campaigns launched against manufacturers. But the public debate misses…
Internet security is a generic term to describe the multitude of tactics used to protect a consumer and safeguard their activities and transactions over the Internet. What do you need to know about Internet Security? When you browse the Internet, you are exposed to all cyber threats. Gone are the days when attackers only targeted businesses and corporations. As an individual home user, you are equally vulnerable to attack. And if your kids use your computer to play or work, you’re just “upping the ante.” Cybercriminals can outwit even the best of us, and kids don’t stand a chance against…
The management of privileged accounts (PAM) is an increasingly important issue within companies. But why is it so important? Privileged Access Management: DEFINITION Privileged Access Management (PAM) solutions are solutions aimed at managing and protecting user accounts with high privileges (internal administrators and service providers) and managing administrative access to IS equipment. Privileged access thus makes it possible to modify the configurations of a system, create and delete user accounts, or access certain sensitive data. Privileged access must be controlled and supervised, because of its importance. What is the difference between user accounts and privileged accounts? There are two main categories of IT accounts: User accounts – A…
A whaling attack refers to a spear phishing attack in which cybercriminals pose as C-suite executives or other business leaders. The attack involves a sophisticated phishing email and can have severe consequences for victims and their organizations. How does a whaling-type attack work? Whaling attacks involve the use of phishing emails. However, these emails tend to be more advanced than standard phishing messages. This is since whaling emails typically: They contain personalized information. Whaling type emails usually include information about the recipient and the organization of it. They seem urgent. A whaling email may include terms and phrases that indicate…