cybersecurity

The Pitfalls of Depending on Security Through Obscurity

Security through obscurity refers to the practice of securing systems by making the system or its underlying implementation hidden. It has long been debated as a strategy for protecting sensitive information and systems from malicious actors. In cybersecurity, Security through obscurity is a concept that revolves around the idea of concealing critical details about security […]

The Pitfalls of Depending on Security Through Obscurity Read More »

Verisign employee accidentally compromises personal data of 63,000 colleagues

Verisign, a prominent telecommunications service provider in the US, recently disclosed a significant data breach affecting over 63000 individuals, mostly its employees. The breach, discovered on September 21, 2023, was only detected three months later, on December 12, 2023, and has impacted 82 people from Maine one of the easternmost states in the United States.

Verisign employee accidentally compromises personal data of 63,000 colleagues Read More »

Clickjacking: Understanding and Preventing it

In the ever-evolving landscape of cybersecurity threats, Clickjacking is a deceptive technique that cybercriminals employ to trick users into clicking something different than what they perceive they are clicking on. Clickjacking is also known as a user interface (UI) redressing attack. When users click something, they think is safe, the hidden UI performs a different

Clickjacking: Understanding and Preventing it Read More »

The Latest Cybersecurity Threat Report Shows Ransomware and BEC Attacks Rising

The 2023 cyber threat landscape shows an acceleration of known threats like ransomware, while business email compromise (BEC) continues to impact organizations financially according to the latest annual threat report from Secureworks. Ransomware remains the top threat facing most organizations. The average time between an initial breach and ransomware deployment, known as “dwell time,” has

The Latest Cybersecurity Threat Report Shows Ransomware and BEC Attacks Rising Read More »

Insider Threats: Protecting Your Organization from Within

Organizations today face an ever-growing threat landscape that extends beyond external attacks. Insider threats, originating from within the organization, pose a significant risk to the security and integrity of sensitive data and assets. Understanding and mitigating these threats is crucial for safeguarding the organization’s operations, reputation, financial stability, and others. Insider threats refer to the

Insider Threats: Protecting Your Organization from Within Read More »

Password Security Measures ii

It is a known fact that we rely heavily on passwords to secure our online accounts in today’s digital world. However, the use of weak passwords or password reuse across multiple accounts makes us vulnerable to cyberattacks. That is why it is essential to regularly perform password exposure tests (PET) to identify weak or compromised

Password Security Measures ii Read More »

Password Security Measures

Passwords have been around since the dawn of the computer age and they remain the primary means of protecting online accounts and personal information. As the number of online transactions and data breaches continue to increase, it is more important than ever to choose and use strong passwords. A strong password is a combination of

Password Security Measures Read More »