Home Search

hygiene - search results

If you're not happy with the results, please do another search
Building Pro-Active Security Hygiene Helps in Preventing Ransomware Attacks: Microsoft

Building Pro-Active Security Hygiene Helps in Preventing Ransomware Attacks: Microsoft

Threat actors have reinvented their attack approaches during the ongoing COVID-19 outbreak. Several new cybersecurity scams and ransomware activities have risen during the pandemic....
Improving Cyber Hygiene

Improving Cyber Hygiene with Greater Social Cybersecurity Engagement

You don’t have to look too far around to find someone who may not be practicing proper cyber hygiene in order to protect themselves...
User Verification Policy, zero trust approach

6 Practices to Strengthen Your Password Hygiene in 2020

By Rudra Srinivas The National Cyber Security Centre (NCSC) of the United Kingdom recently issued a warning to its citizens to have stronger and unique...
return to office, business, hybrid work

Hybrid Work Model and a Digital-first Economy Raise the Stakes on Cybersecurity

Disruption in the way we work has exploded in intensity and breadth since the onset of 2020.  As India starts to see some semblance...
online shopping, International Fraud Awareness Week

International Fraud Awareness Week: 3 Common Online Frauds to Watch Out in 2022

Like online shoppers prefer big sale days to grab deals, cybercriminals prey on e-commerce sites to trick unwitting shoppers. E-commerce websites are often a...
AI and ML

“AI and ML will be an enabler for cybersecurity for the foreseeable future”

In the first half of 2021, cyber adversaries pried on opportunities to attack enterprise infrastructure and critical industries. Even the slightest security mismanagement motivated...
BotenaGo, malware over encrypted connections

BotenaGo – A New Malware Targeting Millions of IoT Devices

Cybersecurity researchers at AT&T Labs uncovered a new malware variant targeting routers and IoT devices. Tracked as BotenaGo, the malware is leveraging over 30...
Cross-site scripting attacks

How Cross-Site Scripting Attacks Work and How to Prevent Them

With the prevalence of hacker intrusions, the consequences of not addressing the vulnerabilities and other security loopholes in your network systems could be severe....
Security Awarenessvideo

“Security is Everybody’s Business”

A joint study from Stanford University Professor Jeff Hancock and security firm Tessian revealed that nine in 10 (88%) data breach incidents are caused...
Ransomware Attacks, Graff ransomware attack

Russia-linked Conti Ransomware Gang Pillages Jewelry Brand Graff

Conti gang, in yet another attack, has targeted a well-known U.K.-based luxury jewelry brand Graff. As per reports, the hackers have pillaged the personal...

MOST POPULAR

RECENT POSTS