How to reduce the risks of email attacks

How to reduce the risks of email attacksMalicious emails can lead to data breaches and ransomware attacks Malicious emails are a significant cybersecurity risk for many organizations. Email remains an important communication method for most organizations even though personal communication is migrating more to text, Facebook Messenger, LinkedIn Message, WhatsApp and various Asian apps. However, organizations continue to receive malicious emails that…

Is my iPhone snooping on my conversations?

Is my iPhone snooping on my conversations?Unless you’re a high-profile celebrity or a golfing buddy of someone like Jeff Bezos, your risk of an attack is very low The Apple FaceTime software defect triggered a much bigger question about the widespread invasion of privacy enabled by iPhones. Many wanted to know if their conversations were being recorded and relayed by various…

Cybersecurity requires urgent action

Cyber vulnerability is humanity’s contemporary Achilles heel

Cybersecurity requires urgent actionThe Greek Scientists Society recently invited me to speak at their inaugural international virtual conference on “Cybersecurity and the New Global Economy of the 21st Century”. Cybersecurity is clearly top of mind these days for individuals, civil society, businesses, financial institutions, and governments at all levels. The Greek Scientist Society was founded two years ago…

A guide to reducing cybersecurity risk at warp speed

Four steps to reduce the risk of cybersecurity incidents adversely impacting your organization’s future

A guide to reducing cybersecurity risk at warp speedCybersecurity lapses continue to make headlines and undermine the fiscal health and reputation of the targeted organizations. Executives are under constant pressure to accommodate all the demands made on them. Providing a little leadership on cybersecurity doesn’t fit well on the to-do list. Meetings with IT specialists often frustrate executives for one or more of…

9 habits that lead to successful cyber security

The average data breach cost to Canadian firms studied hit $7 million

9 habits that lead to successful cyber securityWith Cyber Security Awareness Month almost upon us, I thought it might be helpful for executives to see an actionable list of topics to ask their techies about. Reasonable answers will build your confidence that your organization’s risk of a cyber security breach is being sensibly addressed. The average data breach cost to Canadian firms studied…

Has your smartphone been hacked?

The signs you've been hacked and how to minimize the risk

Has your smartphone been hacked?Hackers try to hide their activities and hope you won’t notice when they steal your identity and your data from your smartphone. Here are the more frequent signs that you’re being hacked and how to minimize the risk or thwart the attack. Unsecure Wi-Fi Wi-Fi in public places, such as cafes or stores, is often…

Why are data breaches still an issue?

How many breaches must we read about before we take action to protect our customer information?

Why are data breaches still an issue?I’m astonished that major data breach stories are still occurring and generating unnerving headlines. How many of these instances do we have to read about before we finally take at least basic action to protect our customer information? As a result of an attack, adult dating and pornography website company FriendFinder Networks exposed the personal…

How to reduce the risk of phishing attacks

October is Cyber Security Awareness Month. But don't wait until then to incorporate security measures

How to reduce the risk of phishing attacksPhishing has evolved into the most effective social engineering attack hackers use to infiltrate organizations. Phishing aims to con employees into unknowingly downloading malware or revealing their access credentials. The best defence is our individual vigilance. Phishing.org defines phishing as “a cybercrime in which a target or targets are contacted by email, telephone or text…
1 2 3 5