BEST PRACTICE PASSWORD POLICY

May 8, 2019

Passwords are supposed to keep us safe. In fact, they’re a high-security risk. You’d be forgiven for assuming that your junior staff would be the users with the least security awareness. But it’s simply not true. Stats show people who work at high levels use passwords that are simply too weak, or follow poor guidelines. You don’t have to look far for examples. Once the hacker went in, his passwords were exposed to the world. A series of embarrassing issues arising for the Clinton campaign ensued. The hackers started telling voters to ‘vote Trump.’ The campaign fell apart and serious ethical questions arose about Clinton and her campaign.

Spotlight

Netsparker Ltd

Netsparker develops industry leading desktop and cloud based automated web application security scanners. Netsparker scanners are very easy to use and their proof-based vulnerability scanning technology enables you to easily and automatically detect SQL Injection, Cross-site scripting and other vulnerabilities in your websites, web applications and web services.

Other Infographics
news image

The Booming Information Security Industry

Infographic | August 26, 2021

The information security industry is expected to exhibit tremendous growth in 2021. The key drivers of this growth are increased spending on cybersecurity services and the rising demand for cloud security. According to Gartner, the 2021 information security and risk management spending is anticipated to grow almost 2X from the previous year.

Read More
news image

CYBER SAFETY STARTS AT HOME

Infographic | January 28, 2020

With everyone in the family using the internet to engage in social media, adjust the home thermostat or shop for the latest connected toy, it is vital to make certain that the entire household — including children and older adults — learn to use the internet safely and responsibility.

Read More
news image

Cyber Security Checklist for 2019

Infographic | December 3, 2019

Over four in ten UK businesses(link is external) suffered a breach or attack during 2018-19, and 43% of cyber attacks are targeting small businesses(link is external). Use our easy to digest infographic to remind yourself and your staff of cyber security best practices, which have never been more important.

Read More
news image

Infographic: Is Your Software Vulnerable to Cybercrime

Infographic | February 13, 2020

Third-party support and self-maintenance can’t protect youthe real solution is at the source. Don’t be fooled by third-party support providers and self-maintenance security methods. Security patching is essential for securing enterprise software, including Oracle’s. If you don’t own the code, you can’t access or update it. That leaves your software open to attack and your business open to risk.

Read More
news image

Cybersecurity Trends to Know in 2019

Infographic | January 22, 2020

A neat infographics to quickly understand the new innovations and emerging technologiesthat are helping organisations strengthen their security practices in 2019. With the number of cyber-incidents on the rise, there is a pressing need to be on top of IT security more than ever. In this infographic, assembled by Paradyn.ie, we look at the new innovations and emerging technologies in 2019 that are helping organisations strengthen their security practices.

Read More
news image

CYBERSECURITY & DATA PRIVACY

Infographic | January 21, 2020

In 2018, cybersecurity and regulation figure prominently among top trends and priorities, increasing in frequency for the 1,400+ executives we interviewed across 10 industries. CGI can provide a discussion of all available benchmarking from our interview data, including each client’s positioning on topics such as IT satisfaction, IT budgets, innovation investments, digital maturity and more.

Read More

Spotlight

Netsparker Ltd

Netsparker develops industry leading desktop and cloud based automated web application security scanners. Netsparker scanners are very easy to use and their proof-based vulnerability scanning technology enables you to easily and automatically detect SQL Injection, Cross-site scripting and other vulnerabilities in your websites, web applications and web services.

Events