HOW TO STAY SAFE WHEN USING PUBLIC WI-FI

May 8, 2019

Most people tend to work from remote, public locations a few times a week. If you’re akin to hanging out at your local Starbucks and prepping your sermon, you could be risking a data breach without really knowing it. One of the most common ways that hackers can access your data is through a ‘man in the middle’ attack. The hacker finds a security flaw in the cafe or shopping center’s router, and exploits it to access the data that passes between you and the hub. To reduce the chances of getting ‘man-in-the-middled’, you need to check whether the public network you want to use is secured or unsecured before you join it. A quarter of all public Wi-Fi hotspots are entirely unencrypted. So, only use networks that require a log-in and password.

Spotlight

GreatHorn

Attacks on cloud email, chat, and collaboration tools are responsible for more than 90% of all data breaches. GreatHorn helps companies secure these platforms from advanced threats, simplify governance and compliance requirements, and communicate with confidence.

Other Infographics
news image

Almost half of companies say cybersecurity readiness has improved in the past year

Infographic | December 16, 2019

Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet's sister site, Tech Pro Research, recently polled IT professionals about the state of cybersecurity in their workplaces. Most seemed to feel that cyberthreats were relatively well controlled. The majority of respondents said their company's cybersecurity readiness was average or above, and most said it had improved in the past year.

Read More
news image

Ransomware Statistics and How to Protect Your Business

Infographic | March 9, 2022

Ransomware Is One of the Most Common Malware Threats. Average ransomware payment in 2021 increased by 82% year over year to $570,000.

Read More
news image

Cyber Security Infographics

Infographic | May 4, 2021

Organisations know cyber security is a major risk; they depend on the Internet and IT systems to communicate with their customers, suppliers, partners and staff.Drawing on our experience in helping senior executives address the key governance and leadership issues around cyber threats, CGI’s Cyber Security Services team have developed a set of actions that senior business leaders can use to focus their organisations on cyber risk readiness.

Read More
news image

Who is behind cyber attacks?

Infographic | January 2, 2020

Regardless of the size or type of organisation you work for, it's important to understand why you might be vulnerable to cyber attack, and how to defend yourself. The advice summarised below is applicable to your working life and your home life. You should also familiarise yourself with any cyber security policies and practices that your organisation has already put in place.

Read More
news image

Artificial Intelligence in Cybersecurity

Infographic | April 4, 2022

Artificial intelligence endeavours to simulate human intelligence. It has immense potential in cybersecurity.

Read More
news image

2020 SONICWALL CYBER THREAT REPORT

Infographic | February 12, 2020

The boundaries of your digital empire are limitless. What was once a finite and defendable space is now a boundless territory a vast, sprawling footprint of devices, apps, appliances, servers, networks, clouds and users. Explore SonicWall’s exclusive threat intelligence to help you better understand how cybercriminals think and be fully prepared for what

Read More

Spotlight

GreatHorn

Attacks on cloud email, chat, and collaboration tools are responsible for more than 90% of all data breaches. GreatHorn helps companies secure these platforms from advanced threats, simplify governance and compliance requirements, and communicate with confidence.

Events