Technology

Cybersecurity: How the “New Normal” Can Impact Your Business

Image by Katie White from Pixabay  With attempts at easing lockdowns globally and an envisaged victory over the COVID-19 pandemic, it’s proper to take into cognizance the cybersecurity impact on your business. Expectations are rife that after the victory the world is heading into a “new normal” in the way society will be organized and the way business will be conducted.  While the main preoccupation of individuals as the COVID-19 pandemic raged on has been how to protect themselves and their families from the virus and how to hold on to their jobs, for business owners, it has been a different ball game altogether. You must have focused on how to beat the pandemic without doing irreversible damage to your economy in the process. This could have led you to take all sorts of decisions that included remote working, telemedicine, outsourcing, and online marketing. All these measures taken to sustain the life of your business are in order, but you probably didn’t take the cybersecurity risks involved into consideration. As the world is grappling and fighting to overcome the pandemic, it’s expected that a “new normal” way of conducting businesses and even living, will be the order of the day. Measures such as…

Continue Reading

Healthcare, Technology

Cybersecurity: The Flip Side of The Coronavirus Pandemic

Image by Gerd Altmann from Pixabay There were insinuations that coronavirus was an accident from a laboratory in Wuhan that was studying bat coronaviruses and then spread to the public, though, this has been debunked by the WHO. If indeed it had been, then the persons behind the evil plan did not take a lot of things including the cybersecurity impact into cognizance. What would it have been like if, for an accident, the whole world was thrown into this mammoth amount of cybersecurity threats and attacks we have been experiencing? Sherrod DeGrippo, senior director of threat research and detection at Proofpoint was reported to have observed that the total volume of phishing emails and other security threats as a consequence of the coronavirus pandemic now represents the largest coalescing of cyberattack types around a single issue that has been seen globally and maybe for a long time to come. Check Point Threat Intelligence, revealed that since January 2020, there have been over 4,000 coronavirus-related domains registered globally. While 3% of the websites were found to be malicious, an additional 5% are suspicious.  Check Point Threat Intelligence also pointed out based on hindsight that coronavirus-related domains are 50% more likely to be malicious…

Continue Reading

Technology

How to Win the Ever-Changing Threats of the Cyberwar

Image by Clker-Free-Vector-Images from Pixabay  Based on the volume, frequency, and dastardness of attacks launched by cybercriminals, it is no longer a hidden fact that the world is in for a cyberwar. The magnitude of the war has made it absolutely imperative that we must embark on building nation-level defenses to fight cyberwar.  It may have been a bit late already but it can never be an overstatement to say that nation-states should put their acts together, fashion out well-articulated cyber defense measures to be able to protect themselves from the most advanced threats ever seen. Looking at the strategies cybercriminals have employed in launching attacks we have experienced so far, we may be at the early stages yet.  It is a cyberwar  Cyber threats and cyberattacks did not just start to manifest yesterday, however, the worldwide gruesome WannaCry and NotPeyta ransomware attacks of 2017, brought cyberattacks to a new level altogether. As if that were not a notification that we the world is grappling with something very mammoth, the expanding levels of malware-related data breaches in 2018, are sheer warnings and realities of the increasingly critical, vulnerable, and fast-developing world of cybercrime we all live and conduct business activities in.  Governments, individuals,…

Continue Reading

Technology

Facial Recognition Could be The Next Access Point For Hackers

Facial recognition, a form of biometric technology is a biological measurement — or physical characteristic — that can be used to identify individuals. Researchers claim the shape of an ear, the way someone sits and walks, unique body odors, the veins in one’s hands, and even facial contortions are other unique identifiers. Because physical characteristics are relatively fixed and individualized — even in the case of twins — they are being used to replace or at least augment password systems for computers, phones, and restricted access rooms and buildings. Biometrics scanners are becoming increasingly sophisticated. For example, Apple’s iPhone X  which operates on the facial recognition technology incidents 30,000 infrared dots onto a user’s face in order to create a sequence of reflections which produce information about the 3D shape of the face, substantiating the user by pattern matching. The chance of mistaken identity is one in a million, according to Apple. This technological advancement should be a thing of joy as it’s supposed to go a long way in easing us of the constant worries of having to remember our passwords and also being very careful not to mistakenly drop them for cybercriminals. It is on record that in…

Continue Reading