Digital Forensics in Healthcare Cyber-criminals are driven by the pursuit of information. Upon breaching the firewalls of an organisation, the goal for many malicious actors is to either extract, steal or monitor data assets of an organisation. With that in mind, it is hardly surprising that the healthcare sector is such an alluring target. Information …
The Importance of a Strong Human Firewall The phrase ‘a poor craftsman blames his tools’ is a truism that echos through to this day, and can be applied in the case of cybersecurity also. The systems and security measures in place regarding cybersecurity are only as effective as the individuals making use of them. If …
Ransomware Attacks An Increasing Threat That is Often Overlooked The visible devastation wrought by the coronavirus pandemic has been bad enough, but the panic and misinformation that it has triggered has led to a steep rise in cybercrime also. Trojan and phishing campaigns remain the leading avenue through which hackers penetrate the defences of corporate …
Ransomware Attacks An Increasing Threat That is Often Overlooked Read More »
Digital Forensics in the Prevention of Cyber Attacks Within the field of digital forensics, there are times when the best offence is defence. Although the central role of digital forensics is the recovery of assets following a cyber-attack, the knowledge acquired through analysis of an incident can be used to implement preventative measures also. In …
Digital Forensics in the Prevention of Cyber Attacks Read More »
Digital Forensics in Healthcare Cyber-criminals are driven by the pursuit of information. Upon breaching the firewalls of an organisation, the goal for many malicious actors is to either extract, steal or monitor data assets of an organisation. With that in mind, it is hardly surprising that the healthcare sector is such an alluring target. Information …
Data Encryption and Endpoint Security In the field of cybersecurity, the greatest challenge faced when trying to secure a company’s digital infrastructure is the number of avenues that are vulnerable to cyberattacks. Malicious actors can exploit practically all IoT devices, networks and servers either virtually or in person. The most difficult technological components to protect …
Operational Technology: The Weak Link in National Security Has it ever occurred to you that the plants that provide you with electricity, that indispensable resource of the modern age, could fall victim to a cyberattack? It seems somewhat unthinkable. Nevertheless, it could happen. Water treatment facilities, power plants, traffic lights and other industrial control systems …
Operational Technology: The Weak Link in National Security Read More »
Automotive Cybersecurity: A New Frontier That Could Save Lives In most people’s minds, the word “cybersecurity” probably conjures images of cloud security, computers, and eCommerce. While it may not be obvious unless you think about it, your car, also, maybe vulnerable to cyber-attacks. There is a price to pay for modernization. Since the automotive industry …
Automotive Cybersecurity: A New Frontier That Could Save Lives Read More »
How Can Artificial Intelligence Be Used in Digital Forensics The term ‘Artificial Intelligence’ (AI) may conjure images of machines from dystopian Hollywood movies, hell bent on the destruction of the human race, though despite its depiction by the film industry, AI is little more than an advanced form of digital programming. The thing that separates …
How Can Artificial Intelligence Be Used in Digital Forensics Read More »