Ten tips to detect a phishing email

May 2, 2019

In mid-2017, the industry was shaken by a major cyber-attack against Maersk, the world’s largest container shipping company, which led the sector to adopt a new look at cyber security issues. 2018 validated this trend as cyber incidents continued affecting operators, ports, and shipbuilders. Ransomware infections are often instigated through phishing emails, which makes employees' awareness and preparedness vital.

Spotlight

Block Ransomware LLC

Stop hackers from encrypting your data with Block Ransomware™ next-generation security. We are a patent pending proprietary solution to block ransomware and protect the critical data files on your servers from criminals and hackers. Block Ransomware was developed by Asher Dahan, CEO of Accurate Data Networks, a technology firm that has provided security solutions to companies of all sizes for over 25 years. Block Ransomware is a unique solution to the burgeoning ransomware problem that is wreaking havoc around the world. Its invention is a result of decades of hands-on experience in the cybersecurity field.

Other Infographics
news image

Cyber Security Infographics

Infographic | May 4, 2021

Organisations know cyber security is a major risk; they depend on the Internet and IT systems to communicate with their customers, suppliers, partners and staff.Drawing on our experience in helping senior executives address the key governance and leadership issues around cyber threats, CGI’s Cyber Security Services team have developed a set of actions that senior business leaders can use to focus their organisations on cyber risk readiness.

Read More
news image

List of Cyber Attacks May 2021

Infographic | June 11, 2021

Do you know what is the most problematic element of cyber security? Yes, it is the constantly evolving nature of cyber attacks. A cyber attack refers to an attack executed from a computer against a computer system or individual computer that compromises the confidentiality, integrity, or availability (CIA) of the information stored on it.

Read More
news image

Navigating the cyber security marketplace

Infographic | January 1, 2020

Infographic showing the interactions of the certified cyber security products and services and how they could help you safeguard your systems PUBLISHED Trusted security products and services certified by the National Cyber Security Centre can help reduce vulnerability to cyber attack.

Read More
news image

Cybercrime By The Numbers

Infographic | January 3, 2020

Malware, ransomware, data breaches, and phishing are top of mind for most companies. As users, devices, applications, and data continue to move outside of the traditional enterprise perimeter and zone of control, attack surfaces will only expand. So, what are the realities of falling prey to a cyber attack?

Read More
news image

Effects of Virtualization Security Risks in Businesses

Infographic | February 19, 2022

Virtualization as a concept is experiencing more utility in recent times due to its ability to offer improved efficiency and scalability while reducing costs. Over 90% of businesses use server virtualization, and more organizations have begun exploring other types of virtualization, including desktop, application, and storage virtualization.

Read More
news image

Artificial Intelligence in Cybersecurity

Infographic | April 4, 2022

Artificial intelligence endeavours to simulate human intelligence. It has immense potential in cybersecurity.

Read More

Spotlight

Block Ransomware LLC

Stop hackers from encrypting your data with Block Ransomware™ next-generation security. We are a patent pending proprietary solution to block ransomware and protect the critical data files on your servers from criminals and hackers. Block Ransomware was developed by Asher Dahan, CEO of Accurate Data Networks, a technology firm that has provided security solutions to companies of all sizes for over 25 years. Block Ransomware is a unique solution to the burgeoning ransomware problem that is wreaking havoc around the world. Its invention is a result of decades of hands-on experience in the cybersecurity field.

Events