The truth about Data Breaches

May 13, 2019

Solitaire report: Breaches lead to lost customers. 18.6x Regaining a customer post-breach costs 18.6 times more than it did to gain them initially.1. 78% of customers would not automatically return to a business after a breach.1. 95% see attempting to cover up a breach as a sign of disrespect.1.

Spotlight

Carbonite

Carbonite provide the peace of mind that comes with protecting your digital life. Our cloud solutions make data durable. Our goal is to enable a world in which important data is always protected, available and useful. We began with a personal backup product that was simple and affordable. Today we're applying the same simplicity and affordability to powerful business continuity solutions for small businesses.

Other Infographics
news image

List of Cyber Attacks May 2021

Infographic | June 11, 2021

Do you know what is the most problematic element of cyber security? Yes, it is the constantly evolving nature of cyber attacks. A cyber attack refers to an attack executed from a computer against a computer system or individual computer that compromises the confidentiality, integrity, or availability (CIA) of the information stored on it.

Read More
news image

Infographic About Network Security

Infographic | April 1, 2021

According to a report, the cybersecurity workforce needs to grow 62% to meet the rising demand. The demand for security professionals is skyrocketing and shows no signs of stopping.

Read More
news image

10 Tips to Protect Your Data

Infographic | July 30, 2021

When making an online purchase, or creating an account online, it is tempting to save banking details and passwords for the sake of convenience. But a data leak from even one of these sources could cost you.

Read More
news image

Infographic: What’s next in AI-powered cyber response?

Infographic | July 13, 2021

AI has been touted to be a game-changer for cybersecurity. It can analyse threats; rapidly detect anomalies; and filter through the thousands of security alerts organisations receive in a day. Singapore is already planning on using AI to secure its 5G networks. But AI is a resource, not a replacement. It has to be supported by the intuition of well-trained security analysts, automation, and a consolidated view of the organisation’s IT environment. Cybersecurity experts from Tanium break down how AI is speeding up cyber response, and how organisations can make the most of the tech.

Read More
news image

CYBERSECURITY & DATA PRIVACY

Infographic | January 21, 2020

In 2018, cybersecurity and regulation figure prominently among top trends and priorities, increasing in frequency for the 1,400+ executives we interviewed across 10 industries. CGI can provide a discussion of all available benchmarking from our interview data, including each client’s positioning on topics such as IT satisfaction, IT budgets, innovation investments, digital maturity and more.

Read More
news image

Cyber Security What Makes a Strong Password

Infographic | December 1, 2019

The frustration of a forgotten password can be just too much to bear. Why not go with “Charles 15” or “my password”? because cybercrime is so prevalent. If you want your bank account to still have your money in the morning, you’d better strengthen your password.

Read More

Spotlight

Carbonite

Carbonite provide the peace of mind that comes with protecting your digital life. Our cloud solutions make data durable. Our goal is to enable a world in which important data is always protected, available and useful. We began with a personal backup product that was simple and affordable. Today we're applying the same simplicity and affordability to powerful business continuity solutions for small businesses.

Events