10 ‘Internet Of Things’ Facts
Internet of Things (IoT) refers to devices or objects that are connected to the Internet. These Smart devices are able to collect and transmit data via the Internet. Below are few facts about them: ATMs are considered some of the first IoT
Cyber Security Roadmap
Hackers personas
Malware Threats
Malware threats broadly can be classified under following categories: Backdoor – A backdoor is a piece of malicious code which allows an attacker to connect to the infected target and take control of the target machine. Backdoors can use a lot of
Managing technology and information risk
What is risk? Risk is the impact of uncertainty on system, people or organizations etc. Risks can emerge from any type of uncertainty, including those related to technology, finance, health and safety, and security. Cyber security risk refers to security risks to
Elements of Cyber Security
Protecting Enterprise from cyber threats entails wholistic Information Risk management. 11 key elements are as below: Application controls – Implement application black/white lists to prevent execution of malicious applications Data leakage prevention – Establish controls for preventing critical data leakage to external
Important things about GDPR
The General Data Protection Regulation (GDPR) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). When the GDPR
How Information Security Governance Can Help You Lead a Better Life
Information Security governance can be best described as the governing framework that is responsible for ensuring the proper alignment of tactical schemes for IT security with the business regulations and objectives through coherence to legal policies and internal rules for providing a
How Cyber Security Expert is Beneficial to Your Business
IT specialists acknowledge the increase of cyberattack threats and that this is not lowering down anytime soon. For instance, on June 27, 2017, Jawaharlal Nehru Port Trust (JNPT) was subjected to a ransomware attack. Many such incidents have been mentioned in recent