List of data breaches in 2018

March 8, 2019

2018 saw some of the biggest data breaches yet, with Marriott, Under Armour and Facebook suffering breaches that affected 500 million, 150 million and 100 million people respectively. It was also the year of the GDPR (General Data Protection Regulation), which changed the way organisations handle customers’ personal data and introduced hefty fines for non-compliance. However, the Regulation didn’t seem to reduce the number of data breaches: there were approximately 2.3 billion last year, compared to 826 million in 2017. Using our monthly ‘List of data breaches and cyber attacks’ blog posts, we’ve created an infographic to sum up the reported data breaches of 2018.

Spotlight

Votiro

Established in 2010 in Israel, Votiro was founded by a team of senior security experts with extensive experience in the public and private sectors of intelligence-gathering and security organizations. Familiar with organizations’ requirements for securing their sensitive, proprietary data, Votiro develops and licenses unique software solutions that protect computer networks from external cyber threats.

Other Infographics
news image

Cyber Security Checklist for 2019

Infographic | December 3, 2019

Over four in ten UK businesses(link is external) suffered a breach or attack during 2018-19, and 43% of cyber attacks are targeting small businesses(link is external). Use our easy to digest infographic to remind yourself and your staff of cyber security best practices, which have never been more important.

Read More
news image

Cyber Security Safety Infographic

Infographic | November 29, 2021

There is an absolute need for cyber security. The key difference, however, is that there are some organizations who have more than enough resources and the latest technology to protect themselves against attacks while others don't even know about the existence of a threat. That's where a statistical infographic comes in to serve as a guide. It educates people about the current cyber security landscape and what needs to be done in order to protect their assets.

Read More
news image

Who is behind cyber attacks?

Infographic | January 2, 2020

Regardless of the size or type of organisation you work for, it's important to understand why you might be vulnerable to cyber attack, and how to defend yourself. The advice summarised below is applicable to your working life and your home life. You should also familiarise yourself with any cyber security policies and practices that your organisation has already put in place.

Read More
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

Cybersecurity Trends to Know in 2019

Infographic | January 22, 2020

A neat infographics to quickly understand the new innovations and emerging technologiesthat are helping organisations strengthen their security practices in 2019. With the number of cyber-incidents on the rise, there is a pressing need to be on top of IT security more than ever. In this infographic, assembled by Paradyn.ie, we look at the new innovations and emerging technologies in 2019 that are helping organisations strengthen their security practices.

Read More
news image

Privileged Access Management (PAM)

Infographic | April 4, 2022

Privileged access management (PAM) controls, monitors, secures and audits all human and non-human identities and activities across an enterprise IT environment.3% of organizations lack a mature approach to access management, resulting in two times more breaches.

Read More

Spotlight

Votiro

Established in 2010 in Israel, Votiro was founded by a team of senior security experts with extensive experience in the public and private sectors of intelligence-gathering and security organizations. Familiar with organizations’ requirements for securing their sensitive, proprietary data, Votiro develops and licenses unique software solutions that protect computer networks from external cyber threats.

Events