Search
Register

Global Unisys Security Index Report 2020

|

The 2020 Unisys Security Index is the only regular snapshot of security concerns conducted globally, since year 2007. The Unisys Security Index provides a regular, statistically robust measure of concerns about four categories of security – national, financial, personal and internet security. It is a B2C survey that covers major insights on security concerns across the mentioned areas and results in the Security Index calculated based on the average of consumers’ concerns in these areas. The survey is comprehensive in terms of demographic segments and provides insights along these lines. The survey also goes deep into the willingness of individuals to share their personal information with different private and government institutions, in different situations cited in the survey. This study...

Why SMBs Need MSSPs & What Benefits Can They Reap?

|

One of the most common misinterpretations among SMBs is that they are less likely to be targeted by cybercriminals. Most of them believe that large scale enterprises are the center of attraction for threat actors. Unfortunately, this belief is completely overruled by the attackers. They have realized that a majority of small businesses possess a large attack surface, do not have sufficient security controls in place, and lack dedicated in-house IT & cybersecurity professionals. This makes SMBs more prone and an easy target to cyber-attacks. Moreover, the growing implementation of advanced technologies like Cloud & IoT creates ample opportunities for cybercriminals to exploit the vulnerabilities in the security posture and cause financial and reputational damage to the enterprises. ...

The Best Tools for Web Application Security Testing

|

Application security testing ensures the reliability and robustness of a web application. The tools needed for such testing, be it open-source or paid, should be able to identify the vulnerabilities and secure the application against malware attacks. Digitization has made the world a small place where communication and exchange of information take place in the blink of an eye. The myriad advantages of the internet are not lost on anyone as individuals, groups, entities, enterprises, and governments are leveraging it to achieve their objectives. What used to be in the realm of science fiction a few decades back has become a definitive reality with digital interactivity taking the world to a different plane altogether. However, notwithstanding the advancements in the field of digitization an...

Part 1: Securing IoT with Asset Management

|

Asset management is the process of keeping track of physical assets and information. Depending upon the business, physical assets can be IT devices, different kinds of equipment, tools or vehicles, etc. Traditionally, industries like Oil and Gas, Manufacturing, Logistics, Transportation, Heavy Machinery and Construction, Equipment Rental, etc. that are known to be asset-intensive, are limited by lack of visibility of their assets. Such industries continuously work towards tracking their Return on Asset (RoA) and are interested in monitoring its assets which includes the task each asset is performing, whether it is being overloaded or under-utilized, the current location of the asset, the lifetime value of the asset, etc. Most of the companies in these sectors are either using or planning t...

Special Threat Advisory

|

A special threat advisory as part of DSCI’s Threat Intelligence & Research initiative. This edition includes: Snake Malware – a new malware & variant continues to hit businesses ElvisPresley Ransomware – a malicious program, part of the Jigsaw ransomware family MAZE Ransomware was initially distributed via spam emails DemonWare Ransomware – a malicious program and was first discovered in June 2020

Web Application Firewall: Don’t Let Attackers To Damage Your Web Presence

|

The prevalence of web applications has exponentially increased as companies are focusing on interactive websites and web applications to streamline interaction with customers, collaboration with employees and make data 24/7 available to the users. Many of these applications hold a vast amount of data, making them a profitable target for cybercriminals. In recent times, web-based attacks have increased at a rapid rate and become the major cause of data breaches. According to Verizon 2020 Data Breach Investigation Report, attacks on web apps have increased to 43% this year, more than double the results from 2019. Moreover, NTT’s 2020 Global Threat Intelligence Report also says that 55% of cyber-attacks in 2019 were a combination of web application and application-specific attacks. Let’s have...

Securing The Most Vulnerable Asset – Human

|

Humans are viewed as the most susceptible link in the People-Process-Technology triad. Despite having robust security solutions like Intrusion Detection Systems (IDS) or firewall, your weakest link could let attackers bypass the security controls. Cybercriminals always take advantage of the fact that people are more likely to create mistakes, which could be intentional, unintentional or lack of action. According to the Human Factor 2019 report, 99% of cyber-attacks require some level of human interaction to execute. Trends like flexible working and personal device usage amidst the new normal have completely changed user behaviour. It has also observed that most of the employees do not restrict their family members and friends from accessing their work devices that may create a myriad of cy...

4 Remarkable Strategies that can Save Your Organization from Phishing

|

In recent times, COVID-19 cases are not the only negative thing growing around the globe. Phishing is another dangerous aspect gaining exponential growth around the world. And the most common targets of the phishers are the corporate sectors. According to the researchers from Barracuda Networks, “COVID-19 related phishing attacks have increased by 667% since the end of February 2020.” So, it has become highly crucial for corporate organizations to inform their employees with appropriate information about phishing. Only an informed mind can save him/her and their vital official data from the hands of these phishers. According to a study of Q1 2020 Phishing Report, “Apple, Netflix, Yahoo, WhatsApp & PayPal are the top 5 mimicked brands for phishing attempts.” People seem to trust these b...

Simple Tips To Secure Your WordPress Blog/Website

|

With the growing hacking attempts, here goes some simple but useful tips to secure your WordPress blog /sites. Tip 1: Don’t use ADMIN as the user name Use a completely random username with the administrative rights. If you are using admin as the username for the administrator login then you are just giving the main entrance key to the hacker. Tip 2: Use Strong Password Make it complex. Use the combination of upper case & lowercase letters, numbers along with special characters. The weak passwords can be easily cracked by the ‘Brute Force’ attack. Change your passwords often.  Don’t use simple passwords like password, 123456, 12345678, abc123, qwerty, etc. Tip 3: Plugin Management Update all active plugins and delete all inactive ones.  Click on Plugins >> Installed Plugins and c...