10 Personal Cyber Security Tips

April 4, 2019

You have just read our blog on the 10 Personal Cyber Security Tips for National Cyber Security Awareness Month. We decided to turn that blog into an infographic for your viewing pleasure! More than half of U.S. consumers are now experiencing the effects of major data breaches. Becoming "Cyber Aware" is critical to protecting your personal identity, data, and online reputation. Enjoy the latest CIPHER infographic and let us know in the comments what other cyber security steps you use to protect yourself personally

Spotlight

Vera Security

Vera is the security platform chosen by the Fortune 500 to secure, track, and control sensitive information that needs to be shared externally. With a keen focus on the user experience for employees and security pros alike, Vera can protect any kind of information, no matter how it's stored or shared, anywhere it travels - without affecting how work gets done.

Other Infographics
news image

Infographic - Top cyber threats in the EU

Infographic | July 29, 2021

Cybersecurity threats are on the rise. Cyberattacks have continued to increase in the EU in 2020 and 2021, in both sophistication and numbers, but also in terms of their impact. The EU is working on various fronts to protect people and businesses from cybercrime and to ensure a safe, open and secure cyberspace.

Read More
news image

Cybersecurity Statistics for 2022

Infographic | June 10, 2022

If you work in the private sector (and provided you don’t live under a rock) you probably already know that cybercrime is a serious problem. A dastardly cybercriminal can expose finances, compromise customer information, and bring businesses to a halt. Skilled hackers are always finding creative ways to execute data breaches, setting a constant arms race into motion — cybersecurity professionals against cybercriminals.

Read More
news image

Effects of Virtualization Security Risks in Businesses

Infographic | February 19, 2022

Virtualization as a concept is experiencing more utility in recent times due to its ability to offer improved efficiency and scalability while reducing costs. Over 90% of businesses use server virtualization, and more organizations have begun exploring other types of virtualization, including desktop, application, and storage virtualization.

Read More
news image

The Importance of Database Security

Infographic | February 3, 2022

Security is everyone’s responsibility. Enabling business, protecting data, and managing risks are critical to literally every business. Maintaining database security is important to safeguard highly confidential and sensitive data. Between January and September 2020, about 36 billion pieces of data were compromised. In 2021, data breach costs increased from USD 3.86 million to USD 4.24 million.

Read More
news image

2020 SONICWALL CYBER THREAT REPORT

Infographic | February 12, 2020

The boundaries of your digital empire are limitless. What was once a finite and defendable space is now a boundless territory a vast, sprawling footprint of devices, apps, appliances, servers, networks, clouds and users. Explore SonicWall’s exclusive threat intelligence to help you better understand how cybercriminals think and be fully prepared for what

Read More
news image

Cyber Security Infographics

Infographic | May 4, 2021

Organisations know cyber security is a major risk; they depend on the Internet and IT systems to communicate with their customers, suppliers, partners and staff.Drawing on our experience in helping senior executives address the key governance and leadership issues around cyber threats, CGI’s Cyber Security Services team have developed a set of actions that senior business leaders can use to focus their organisations on cyber risk readiness.

Read More

Spotlight

Vera Security

Vera is the security platform chosen by the Fortune 500 to secure, track, and control sensitive information that needs to be shared externally. With a keen focus on the user experience for employees and security pros alike, Vera can protect any kind of information, no matter how it's stored or shared, anywhere it travels - without affecting how work gets done.

Events