TOP TEN THREATS TO CLOUD SECURITY

February 13, 2019

CRYPTOJACKING. Using someone else's compute and resources to mine cryptocurrencies.. DATA LEAK. The exposure of confidential data through misconfigurations or similar modes. SSH BRUTE FORCE ATTACK. Repeated attempts to guess secure shell username & password combinations in an attempt to gain unauthorized access.

Spotlight

CSP Global Technologies Sdn Bhd

We are a dynamic and regional technology that help clients harness the power of innovation to thrive on change. We take pride in our technology independence and our role as a trusted advisor. Our deep experience gives us a clear and confident vision to help clients navigate the future. Through innovative technology solutions built around Digital, Network Security, Analytics, Infrastructure Management and Engineering Services, amongst others, we solve complex business problems for you. Our extensive partner network helps us drive collaboration and leverage technology independence.

Other Infographics
news image

Importance of Data Masking

Infographic | March 24, 2022

The Data Masking market was valued at USD 483.90 million in 2020 and is expected to reach USD 1044.93 million by 2026.

Read More
news image

Data Loss Prevention Best Practices

Infographic | March 16, 2022

Every organization, regardless of size or industry, needs a data loss prevention (DLP) strategy to prevent data from being improperly accessed or deleted.

Read More
news image

Alarming Cyber Security Stats to Know for 2022 & Beyond

Infographic | June 7, 2022

The best way to achieve security is to implement proper controls in place, train well on cyber-security, and follow the recommended best practices.

Read More
news image

Know the Use Cases of Biometric Technologies

Infographic | April 4, 2022

Biometrics is the most suitable means of identifying and authenticating individuals. It is reliable and fast because of the unique biological characteristics it uses.

Read More
news image

What is phishing? How this cyber attack works and how to prevent it

Infographic | February 12, 2020

Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated.

Read More
news image

Active directory IT security infographic

Infographic | January 24, 2020

Active Directory is a great technology. In fact I can’t image life without it. It’s pretty easy to set up, with every Microsoft Server release it gains additional options that make life for IT easier. Did you know that only 5% of 1000 fortune companies don’t use AD to organize their environment?

Read More

Spotlight

CSP Global Technologies Sdn Bhd

We are a dynamic and regional technology that help clients harness the power of innovation to thrive on change. We take pride in our technology independence and our role as a trusted advisor. Our deep experience gives us a clear and confident vision to help clients navigate the future. Through innovative technology solutions built around Digital, Network Security, Analytics, Infrastructure Management and Engineering Services, amongst others, we solve complex business problems for you. Our extensive partner network helps us drive collaboration and leverage technology independence.

Events