Family and Teen’s Cyber Security Infographic

February 16, 2017

Did you know for instance that “over half of adolescents and teens have been bullied online and about the same number have engaged in cyber-bullying?” Learn more about this reality with this infographic, which includes information on cyber bullying, cyber stalking, sexting, inappropriate content and social media addiction. And it also offers some useful tips for parents to protect their kids from inappropriate content and prevent social media addiction.

Spotlight

Pwnie Express

Pwnie Express provides threat detection of the billions of wireless and wired devices in and around your workplace. By automating wireless and wired device detection, Pwnie solutions continuously detect the devices on or around your network that are open pathways for attackers. Pwnie arms your security team to win the BYOD battle with the ability to detect and fingerprint any device, from phone to thermostat, in order to prioritize your security response, reduce alert fatigue, and provide situational intelligence. Guided by CEO Paul Paget and CTO Dave Porcello, Pwnie Express has enabled organizations to get the answers they need in a timely and effective manner. From the original Pwn Plug to today's Pwn Pulse solution, we do it to arm your security team. Our customers are using the industry’s only solution to detect and fingerprint any device, from phone to thermostat. We partner with our users so that they not only see all the things, but also have the correct intel to prioritize secu

Other Infographics
news image

Infographic: What’s next in AI-powered cyber response?

Infographic | July 13, 2021

AI has been touted to be a game-changer for cybersecurity. It can analyse threats; rapidly detect anomalies; and filter through the thousands of security alerts organisations receive in a day. Singapore is already planning on using AI to secure its 5G networks. But AI is a resource, not a replacement. It has to be supported by the intuition of well-trained security analysts, automation, and a consolidated view of the organisation’s IT environment. Cybersecurity experts from Tanium break down how AI is speeding up cyber response, and how organisations can make the most of the tech.

Read More
news image

Cyber Security Infographics

Infographic | May 4, 2021

Organisations know cyber security is a major risk; they depend on the Internet and IT systems to communicate with their customers, suppliers, partners and staff.Drawing on our experience in helping senior executives address the key governance and leadership issues around cyber threats, CGI’s Cyber Security Services team have developed a set of actions that senior business leaders can use to focus their organisations on cyber risk readiness.

Read More
news image

Cyber Security Infographics

Infographic | May 4, 2021

Organisations know cyber security is a major risk; they depend on the Internet and IT systems to communicate with their customers, suppliers, partners and staff.Drawing on our experience in helping senior executives address the key governance and leadership issues around cyber threats, CGI’s Cyber Security Services team have developed a set of actions that senior business leaders can use to focus their organisations on cyber risk readiness.

Read More
news image

Infographic About Network Security

Infographic | April 1, 2021

According to a report, the cybersecurity workforce needs to grow 62% to meet the rising demand. The demand for security professionals is skyrocketing and shows no signs of stopping.

Read More
news image

Cybersecurity in Retail Infographic

Infographic | February 15, 2020

77% of consumers believe that cybersecurity and data privacy is the 3rd most important factor when selecting a retailer, even outranking discounts and brand reputation. Percentage of consumers considering the following factors as one of the top five criteria while selecting their primary retailer. Percentage of consumers considering the following factors as one of the top five criteria while selecting their primary retailer.

Read More
news image

Infographic: Is Your Software Vulnerable to Cybercrime

Infographic | February 13, 2020

Third-party support and self-maintenance can’t protect youthe real solution is at the source. Don’t be fooled by third-party support providers and self-maintenance security methods. Security patching is essential for securing enterprise software, including Oracle’s. If you don’t own the code, you can’t access or update it. That leaves your software open to attack and your business open to risk.

Read More

Spotlight

Pwnie Express

Pwnie Express provides threat detection of the billions of wireless and wired devices in and around your workplace. By automating wireless and wired device detection, Pwnie solutions continuously detect the devices on or around your network that are open pathways for attackers. Pwnie arms your security team to win the BYOD battle with the ability to detect and fingerprint any device, from phone to thermostat, in order to prioritize your security response, reduce alert fatigue, and provide situational intelligence. Guided by CEO Paul Paget and CTO Dave Porcello, Pwnie Express has enabled organizations to get the answers they need in a timely and effective manner. From the original Pwn Plug to today's Pwn Pulse solution, we do it to arm your security team. Our customers are using the industry’s only solution to detect and fingerprint any device, from phone to thermostat. We partner with our users so that they not only see all the things, but also have the correct intel to prioritize secu

Events