Navigating the Future of Data Protection with Richard Giddey, VP APAC at Actiphy
Navigating the Future of Data Protection with Richard Giddey, VP APAC at Actiphy Read More »
The Electoral Commission has admitted it failed a cybersecurity test in the same year hackers successfully attacked the organisation. The UK’s elections watchdog said it did not pass a Cyber Essentials test, a voluntary government-backed scheme that assesses an organisation’s readiness against cyber-attacks. The commission said it failed the test in 2021, when it was
Introduction Hello again, I’m Richard Giddey, VP for the Asia-Pacific region at Actiphy. With an extensive history in storage and backup, I’ve been in the industry’s trenches, seeing its evolution firsthand. Today, let’s explore another critical dimension that directly impacts your data protection strategy—Data Protection. The Imperative of Long-term Data Retention Why Long-term Data Retention
In March 2022, the Securities and Exchange Commission (SEC) proposed a rule on cybersecurity disclosure, governance, and risk management for public companies, known as the Proposed Rule for Public Companies (PRPC). This rule would require companies to report “material” cybersecurity incidents within four days. It would also require that boards of directors have cybersecurity expertise.
Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs Read More »
August 28, 2023- WASHINGTON – The National Cybersecurity Alliance (NCA) today announced it has received a significant boost in funding from Craig Newmark Philanthropies. The $200,000 grant will support ongoing initiatives within NCA’s Historically Black Colleges and Universities (HBCU) Cybersecurity Career, Mentoring, and Scholarship Program, as students return to school. Launched in 2022, the ‘See Yourself In
Hackers have developed a sneaky new tactic to push malware onto your phone and snoop on your conversations. Researchers at the cybersecurity firm ESET found fake apps in the Google and Samsung app stores that posed as extensions or premium versions of the popular messaging platforms Signal and Telegram designed to steal user data. The
DALLAS, Aug. 29, 2023 /PRNewswire-PRWeb/ — Everest Group is calling on enterprises to make the critical shift in focus from cybersecurity to cyber resilience. While cybersecurity focuses on safeguarding against threats, cyber resilience emphasizes the ability to withstand, respond and recover quickly from them. Everest Group issues this call to action in its recently published “State of the
Ransomware is a tool that cyber-criminals use to infiltrate computer servers, desktops, laptops and other mobile devices. This malicious software then encrypts a company’s critical files and web properties and holds them for ransom until the company or organisation pays the requested amount (usually through cryptocurrency), on which the cyber-criminal will release the company’s digital
MSPs: Are You Protected Against Ransomware in 2019? Read More »
Blended attacks combine multiple threats into a single attack to leave a networked computer completely compromised. Normal cyber attacks tend to have only one attack vector, but blended attacks will use multi-pronged strikes to exploit any vulnerabilities. Security and IT personnel have a difficult time trying to deal with a blended attack as they hit
What is a Blended Attack? Read More »
With the year drawing to a close and the holidays fast approaching, we take time to look back at the cyber attacks that dominated the world of cyber crime in 2018. By understanding the main tactics used by cyber criminals this year, we can predict and become more prepared for next year’s threats. 5
2018’s Most Common Cyber Attacks Read More »