Tag: #securityrisks #cybersecurity #cyberdefence #securitytips #securityintelligence #securityoperationscenter

9 articles

Search (2)

The Top Browser Threats When end users venture out onto the Internet, it’s easy to get tangled up in the vast web of threats lurking on many website pages. Some of them are readily apparent, but others are well hidden.   Malvertising—a form of malicious code that distributes malware through online advertising—can be hidden within […]

Mobile

Mobile Threats Jeopardizing Company Data Mobile security is increasingly becoming a big concern as more and more companies adopt Bring Your Own Device (BYOD) environments, which allow end users to connect to corporate networks through their own (often multiple) devices. Even in cases where a business does not offer BYOD, end users often find a […]

Locks

Low Security Account Credentials Although it should be common sense, employees need to avoid the use of passwords that are easy for hackers to guess. Among the top ten worst passwords according to Splashdata, are those that use a series of numbers in numerical order, such as <123456>. The names of popular sports such as […]

Email

Email Threats Social Engineering Inboxes and VoiceMail Social engineering is non-technical, malicious activity that exploits human interactions to obtain information about internal processes, configuration and technical security policies in order to gain access to secure devices and networks. Such attacks are typically carried out when cyber criminals pose as credible, trusted authorities to convince their […]

6 Security Flaws In This Photo

Chapter 1: Physical Security Precautions Keep a Clean Desk It makes sense and sounds so simple, but keeping a clean desk is often overlooked when talking about cyber security. It’s also the perfect place to start the security discussion with employees. Employees that keep a cluttered desk tend to leave USB drives and smartphones out […]

Activist Anonymous Ransomware Attack

A complete endpoint security solution for your business’ needs. Backed by a US$1m ransomware warranty. Is your business looking for threat protection, remediation, incident response and the benefits of a security operations center (SOC)? Cylon for Endpoint Security monitors your IT environment, detecting malicious threats and quickly remediating the attack, with 24/7 support from our […]

Cybersecurity Tips

The Complete Guide to Secure Behavior Online and in the Office. The Need to Educate Employees on Cybersecurity. When developing cybersecurity strategies, businesses typically focus on protecting their infrastructure perimeter and endpoints, since that’s where criminals usually gain access and wreak havoc. But what happens when a threat bypasses perimeter defenses and targets an employee—in […]

Office Security

5 Tips for a More Secure Office When thinking about securing your business from cyber threats, the mind quickly turns to phishing, hacks and viruses, but there are many security threats in and around the office that can expose your business to a host of threats and cybersecurity issues. In conjunction with a solid cybersecurity […]

City Power confirmed on Twitter this morning that it has been hit by a ransomware attack which compromised its web server, databases, applications, and network. See how, with our SOC (Security Operations Center) you can prevent Ransomware attacks on your business. https://devweb.cylonconsulting.com/wp-content/uploads/2019/06/Understanding-the-SOC.mp4#t=2 To Learn more: Click here To read the full article by mybroadband.co.za  Click […]

← All Posts