Cyber Insight

Uncategorised

Honeypot

The key roles of honeypots, tarpits and black holes in cybersecurity

In the cybersecurity world honeypots represent traps designed solely to lure cybercriminals away from the real targets – sensitive corporate data repositories and vulnerable systems and applications. Honeypots appear to those with malintent as actual computer systems carrying data and applications. However, they dupe hackers into believing they have identified an authentic target such as …

The key roles of honeypots, tarpits and black holes in cybersecurity Read More »

OSINT

Your company’s secrets. Are they as secure as you believe them to be?

Currently, almost every malicious cyberattack involves open-source intelligence or OSINT. This refers to the collection and analysis of data gathered from open or overt and publicly-available sources to produce actionable intelligence. The concept of OSINT was initially used to address matters of national security. In the United States, for example, the process of gathering OSINT falls …

Your company’s secrets. Are they as secure as you believe them to be? Read More »

Virus Image

Disturbing victor in 2022 business risk survey

It was expected that the effects of the Covid-19 pandemic and surges in Delta and Omicron infections would have resulted in Business Interruption (BI) maintaining its top spot in the 2022 rankings of the acclaimed Allianz Risk Barometer survey. The annual Allianz survey and subsequent report identifies the top corporate risks expected for the next 12 …

Disturbing victor in 2022 business risk survey Read More »

Ransomware Image

Does ransomware’s evolution point to a cybercrime apocalypse?

One of the first ransomware attacks ever documented was the AIDS Trojan – also known as the PC Cyborg Virus. Conceived in 1989, it was released on 20,000 infected floppy diskettes labelled “AIDS Information – Introductory Diskettes” and disseminated to attendees at the World Health Organization’s AIDS conference in Stockholm.   The trojan hid directories …

Does ransomware’s evolution point to a cybercrime apocalypse? Read More »

Significant security benefits from a 2FA and password management partnership

We are being encouraged to adopt two-factor authentication (2FA), the process of adding an additional layer of security when accessing accounts and services online. It requires an additional login credential – beyond just the usual username and password – to gain account access. Getting that second credential requires a second device; your cell phone, for …

Significant security benefits from a 2FA and password management partnership Read More »