<
>

SMEs Can Have Access to Expert Cybersecurity Professionals Too

  Cyber security awareness is becoming a top priority for business globally. A large global company can withstand substantial losses from cyber attacks, for SMEs it can destroy your entire business. According to the Verizon...

How Would You Like Access to Cybersecurity Experts on Tap?

  The problem with Cybersecurity is that “you don’t know what you don’t know”. If you consider the number of cybersecurity accreditations and qualifications a highly rated Cybersecurity expert has...

Personal Data of Malaysians Being Sold for Cheap Signals Need for More Stringent Data Privacy Laws

In many of the security conferences we have covered in Malaysia, the Personal Data Protection Act 2010 (PDPA) sometimes gets a mention, especially leading up to the introduction of the EU’s General Data Protection...

Ensure Your Business Continuity with an Efficient Crisis Communication System

Whenever there is a crisis at hand, be it a natural disaster, or a major power outage resulting in corporation-wide network failure, business productivity and operations must go on. No matter how serious the crisis is,...

All Your DR and BC Investments Are Moot If Your Personnel Can’t Communicate During a Crisis

Businesses today are faced with an ever-growing range of risks, brought on by weather-related events that are increasing in frequency and severity, to an expanding reliance on a complex network of supply chains and...

Why Crisis Communication Solutions Can Benefit Every Business

Communication is essential in times of crisis. While national broadcast agencies normally broadcast emergency service messages, rescue and military personnel also send out messages informing the public of the crisis and...

Solving an Age-Old Problem with a Single IT Security Recommendation

by Morey J. Haber, CTO & CISO at BeyondTrust In the cyber world, we’re exposed to an onslaught of recommendations and top lists for improving IT security. These recommendations come about due to the...

Are You a Password Recycler or Cycler? One is a Security Best Practice, the Other, a Disaster Waiting to Happen

By Morey Haber, CTO & CISO at BeyondTrust Are you a recycler? Over the years, we’ve learned some difficult lessons about recycling. Having “disposable” everything while convenient is not good for the...

The Best Password Advice Ever

Back in April this year, a blog from Microsoft stated their position on the concept of expiring passwords. In a blog post which discussed security for Windows 10, they made it clear that the long accepted practice of expiring...

Domain Spoofing Explained

What is Domain Spoofing? Domain spoofing is a form of online fraud or phishing technique whereby cybercriminals impersonate a company or its employees using a fake domain that appears similar to a legitimate one in...