Phishing in the financial industry

January 29, 2019

Phishing is the most highly effective cybercrime according to most all data analysis.  While Phishing has been around for years, there are more advanced technologies and tools in the hands of Cyber Criminals, and the overall impact and costs related to Phishing are becoming an epidemic. With that said, some industries represent a more attractive target for criminals. Toward the top of that list, we find the Financial Services Industry. Banks, Insurance Companies, online payments services, and other financial services sectors have been impacted by phishing in the past few years.

Spotlight

Positive Technologies

We have earned our reputation as one of the foremost authorities on SCADA, Banking, Telecom, SS7, Vulnerability Management, SIEM, Web Application and ERP security, anywhere. Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. We are among the world’s most advanced specialist researchers, renowned security experts and highly-skilled programmers. With one of the largest and most dynamic research facilities in the world, Positive Technologies carries out research, penetration testing and threat and vulnerability analysis on dozens of large-scale networks each year. As a result we have developed a unique understanding of how security should work, across a wide range of geographies and systems. We earned our reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, anywhere. Hands-on experience, underscored by a decade of se

Other Infographics
news image

Necessity and Benefits of IoT Security Best Practices for Businesses

Infographic | February 24, 2022

While the IoT can bring new data and helpful insights, it can also introduce new vulnerabilities into your organization. The size of the IoT market was 15.8 billion in 2021. IoT security market is projected to grow to 18.6 billion in 2022. The market is predicted to nearly double in size by 2025. There were more than 1.5 billion IoT breaches from January to June 2021

Read More
news image

Cyber Security Awareness

Infographic | December 20, 2019

Cyber security awareness promotes foundational understandings on cyber threats and risk, cyber hygiene, and appropriate response options. It informs citizens on best practices and proactive measures when confronted with cyber risks.

Read More
news image

Privileged Access Management (PAM)

Infographic | April 4, 2022

Privileged access management (PAM) controls, monitors, secures and audits all human and non-human identities and activities across an enterprise IT environment.3% of organizations lack a mature approach to access management, resulting in two times more breaches.

Read More
news image

Who is behind cyber attacks?

Infographic | January 2, 2020

Regardless of the size or type of organisation you work for, it's important to understand why you might be vulnerable to cyber attack, and how to defend yourself. The advice summarised below is applicable to your working life and your home life. You should also familiarise yourself with any cyber security policies and practices that your organisation has already put in place.

Read More
news image

Social Engineering Attack Facts

Infographic | April 4, 2022

Social engineering attacks exploit human error to access credentials or spread malware using infected email attachments or links to malicious websites.43% of IT experts report that they have been victims of social engineering.

Read More
news image

Infographic: What’s next in AI-powered cyber response?

Infographic | July 13, 2021

AI has been touted to be a game-changer for cybersecurity. It can analyse threats; rapidly detect anomalies; and filter through the thousands of security alerts organisations receive in a day. Singapore is already planning on using AI to secure its 5G networks. But AI is a resource, not a replacement. It has to be supported by the intuition of well-trained security analysts, automation, and a consolidated view of the organisation’s IT environment. Cybersecurity experts from Tanium break down how AI is speeding up cyber response, and how organisations can make the most of the tech.

Read More

Spotlight

Positive Technologies

We have earned our reputation as one of the foremost authorities on SCADA, Banking, Telecom, SS7, Vulnerability Management, SIEM, Web Application and ERP security, anywhere. Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. We are among the world’s most advanced specialist researchers, renowned security experts and highly-skilled programmers. With one of the largest and most dynamic research facilities in the world, Positive Technologies carries out research, penetration testing and threat and vulnerability analysis on dozens of large-scale networks each year. As a result we have developed a unique understanding of how security should work, across a wide range of geographies and systems. We earned our reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, anywhere. Hands-on experience, underscored by a decade of se

Events