Search
Register

Part 1: Securing IoT with Asset Management

|

Asset management is the process of keeping track of physical assets and information. Depending upon the business, physical assets can be IT devices, different kinds of equipment, tools or vehicles, etc. Traditionally, industries like Oil and Gas, Manufacturing, Logistics, Transportation, Heavy Machinery and Construction, Equipment Rental, etc. that are known to be asset-intensive, are limited by lack of visibility of their assets. Such industries continuously work towards tracking their Return on Asset (RoA) and are interested in monitoring its assets which includes the task each asset is performing, whether it is being overloaded or under-utilized, the current location of the asset, the lifetime value of the asset, etc. Most of the companies in these sectors are either using or planning t...

Special Threat Advisory

|

A special threat advisory as part of DSCI’s Threat Intelligence & Research initiative. This edition includes: Snake Malware – a new malware & variant continues to hit businesses ElvisPresley Ransomware – a malicious program, part of the Jigsaw ransomware family MAZE Ransomware was initially distributed via spam emails DemonWare Ransomware – a malicious program and was first discovered in June 2020

Web Application Firewall: Don’t Let Attackers To Damage Your Web Presence

|

The prevalence of web applications has exponentially increased as companies are focusing on interactive websites and web applications to streamline interaction with customers, collaboration with employees and make data 24/7 available to the users. Many of these applications hold a vast amount of data, making them a profitable target for cybercriminals. In recent times, web-based attacks have increased at a rapid rate and become the major cause of data breaches. According to Verizon 2020 Data Breach Investigation Report, attacks on web apps have increased to 43% this year, more than double the results from 2019. Moreover, NTT’s 2020 Global Threat Intelligence Report also says that 55% of cyber-attacks in 2019 were a combination of web application and application-specific attacks. Let’s have...

Securing The Most Vulnerable Asset – Human

|

Humans are viewed as the most susceptible link in the People-Process-Technology triad. Despite having robust security solutions like Intrusion Detection Systems (IDS) or firewall, your weakest link could let attackers bypass the security controls. Cybercriminals always take advantage of the fact that people are more likely to create mistakes, which could be intentional, unintentional or lack of action. According to the Human Factor 2019 report, 99% of cyber-attacks require some level of human interaction to execute. Trends like flexible working and personal device usage amidst the new normal have completely changed user behaviour. It has also observed that most of the employees do not restrict their family members and friends from accessing their work devices that may create a myriad of cy...

4 Remarkable Strategies that can Save Your Organization from Phishing

|

In recent times, COVID-19 cases are not the only negative thing growing around the globe. Phishing is another dangerous aspect gaining exponential growth around the world. And the most common targets of the phishers are the corporate sectors. According to the researchers from Barracuda Networks, “COVID-19 related phishing attacks have increased by 667% since the end of February 2020.” So, it has become highly crucial for corporate organizations to inform their employees with appropriate information about phishing. Only an informed mind can save him/her and their vital official data from the hands of these phishers. According to a study of Q1 2020 Phishing Report, “Apple, Netflix, Yahoo, WhatsApp & PayPal are the top 5 mimicked brands for phishing attempts.” People seem to trust these b...

Simple Tips To Secure Your WordPress Blog/Website

|

With the growing hacking attempts, here goes some simple but useful tips to secure your WordPress blog /sites. Tip 1: Don’t use ADMIN as the user name Use a completely random username with the administrative rights. If you are using admin as the username for the administrator login then you are just giving the main entrance key to the hacker. Tip 2: Use Strong Password Make it complex. Use the combination of upper case & lowercase letters, numbers along with special characters. The weak passwords can be easily cracked by the ‘Brute Force’ attack. Change your passwords often.  Don’t use simple passwords like password, 123456, 12345678, abc123, qwerty, etc. Tip 3: Plugin Management Update all active plugins and delete all inactive ones.  Click on Plugins >> Installed Plugins and c...