HEALTHCARE INDUSTRY CYBER THREATS

January 23, 2019

The number of affected patient records almost tripled from Q1 2018 to Q2 2018. Why Is It Happening? High value healthcare records - Personally Identifiable Information (PII) at 408$ per record - Highest Across Industries! 78% of healthcare staff lacked proper data privacy and security awareness. High Value of Intellectual Property.

Spotlight

Evidence-Based Cybersecurity

The notion of ‘cybersecurity’ in academic literature and the world is still technical. Our work is unique in that we focus on human behavior. We are trying to understand the interactions among the four major actors in the cybercrime ecosystem: cybercriminals, enablers (individuals who support online criminal operations), targets and guardians (official law enforcement agencies and system.

Other Infographics
news image

Infographic: What’s next in AI-powered cyber response?

Infographic | July 13, 2021

AI has been touted to be a game-changer for cybersecurity. It can analyse threats; rapidly detect anomalies; and filter through the thousands of security alerts organisations receive in a day. Singapore is already planning on using AI to secure its 5G networks. But AI is a resource, not a replacement. It has to be supported by the intuition of well-trained security analysts, automation, and a consolidated view of the organisation’s IT environment. Cybersecurity experts from Tanium break down how AI is speeding up cyber response, and how organisations can make the most of the tech.

Read More
news image

Navigating the cyber security marketplace

Infographic | January 1, 2020

Infographic showing the interactions of the certified cyber security products and services and how they could help you safeguard your systems PUBLISHED Trusted security products and services certified by the National Cyber Security Centre can help reduce vulnerability to cyber attack.

Read More
news image

Cybersecurity Best Practices Every Enterprise Should Follow in 2020

Infographic | February 11, 2020

Lack of awareness in protecting customer’s sensitive data can lead to severe repercussions. Therefore, enterprises should be able to predict potential cybersecurity risks and invest more in building strategies against hackers. But then, those strategies don’t have to be complicated. In fact, simplifying your approach towards cybersecurity (or cybercriminals at large) can go a long way.Not sure if you are maintaining the right cyber hygiene for your business and your customers? Here are a few tips by industry leaders that could help.

Read More
news image

Impact of Social Engineering Attacks

Infographic | April 4, 2022

A social engineering attack exploits human error to gain access to private and sensitive information.

Read More
news image

Infographic - Top cyber threats in the EU

Infographic | July 29, 2021

Cybersecurity threats are on the rise. Cyberattacks have continued to increase in the EU in 2020 and 2021, in both sophistication and numbers, but also in terms of their impact. The EU is working on various fronts to protect people and businesses from cybercrime and to ensure a safe, open and secure cyberspace.

Read More
news image

Cyber Security Awareness

Infographic | December 20, 2019

Cyber security awareness promotes foundational understandings on cyber threats and risk, cyber hygiene, and appropriate response options. It informs citizens on best practices and proactive measures when confronted with cyber risks.

Read More

Spotlight

Evidence-Based Cybersecurity

The notion of ‘cybersecurity’ in academic literature and the world is still technical. Our work is unique in that we focus on human behavior. We are trying to understand the interactions among the four major actors in the cybercrime ecosystem: cybercriminals, enablers (individuals who support online criminal operations), targets and guardians (official law enforcement agencies and system.

Events