Cyber Security in 2019

January 2, 2019

With a new year of cyber threats ahead of us, what are the cyber security trends and activities most likely to affect your organisation? As 2019 gets underway, plenty of people are sharing their predictions for the year ahead. While there are plenty of unknowns ahead for the public sector, not least surrounding Brexit, one thing we can be certain about is the growing need for robust cyber security in the face of increasingly sophisticated and frequent attacks.

Spotlight

TheVault

The world’s first blockchain solution to Secure, Protect and Guarantee trades and transactions. TheVault platform comprises a Security Consensus Network managed by trusted nodes and driven by a cloud-based, AI-powered Fraud Detection Solution with a consumer application protection to effectively eliminate cyber attacks and money laundering, while providing consumer protection to end users.

Other Infographics
news image

Effects of Virtualization Security Risks in Businesses

Infographic | February 19, 2022

Virtualization as a concept is experiencing more utility in recent times due to its ability to offer improved efficiency and scalability while reducing costs. Over 90% of businesses use server virtualization, and more organizations have begun exploring other types of virtualization, including desktop, application, and storage virtualization.

Read More
news image

2019 Cyber Etiquette: A Guide To Today’s Top Cyber Threats

Infographic | December 20, 2019

The best detection and response solutions provide deep visibility to secure and investigate potential risk. Greater automation and contextualization of security events brings more informed decision-making, faster triage and effective remediation of threats.

Read More
news image

Impact of Social Engineering Attacks

Infographic | April 4, 2022

A social engineering attack exploits human error to gain access to private and sensitive information.

Read More
news image

Cybercrime By The Numbers

Infographic | January 3, 2020

Malware, ransomware, data breaches, and phishing are top of mind for most companies. As users, devices, applications, and data continue to move outside of the traditional enterprise perimeter and zone of control, attack surfaces will only expand. So, what are the realities of falling prey to a cyber attack?

Read More
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

The Importance of Active Directory Security Best Practices

Infographic | February 9, 2022

There’s no silver bullet solution to cybersecurity, a layered defense is the only viable defense. Active directory (AD) security best practicesare crucial because they are central to many vulnerable functions, such as Network access.

Read More

Spotlight

TheVault

The world’s first blockchain solution to Secure, Protect and Guarantee trades and transactions. TheVault platform comprises a Security Consensus Network managed by trusted nodes and driven by a cloud-based, AI-powered Fraud Detection Solution with a consumer application protection to effectively eliminate cyber attacks and money laundering, while providing consumer protection to end users.

Events