The Healthcare Industry had for decades neglected their IT infrastructure, especially the aspect of Cybersecurity. Even at the time of this writing, it is not uncommon to see hospital-computers running…
Read More
The Healthcare Industry had for decades neglected their IT infrastructure, especially the aspect of Cybersecurity. Even at the time of this writing, it is not uncommon to see hospital-computers running…
Read More
Among the different kinds of malware threats, ransomware still retains its dominance, according to the Europol Internet Organised Crime Threat Assessment 2018. The Europol Assessment report says, “Even though the…
Read More

Forensic investigations became the “new normal”, as cybercriminals increased their activities at the expense of users and businesses alike. It is sad to admit that cybercrime is set to grow…
Read More
Australian statistics has revealed that 63 data breaches have been reported in the first two months of the year, which is something that needs to be addressed. Out of the…
Read More
Tenable, a cyber exposure firm, has recently released their Cyber Defender Strategies report with unexpected results. Of the 2,100 organizations assessed in the study, only 5% has consistently practice persistent…
Read More
The millennial generation has already started becoming an influential force in the workforce, hot on the heels of Generation X which it immediately succeeds. Millennials are people born from 1981…
Read More
Because the transfer of data used to function through the Sneakernet, personal computing in the 80’s and 90’s was a lot more simple. The slang term refers to the method users must adopt,…
Read More
The technology must evolve to counter cyber attacks. We have seen how the complexity and sophistication is one step ahead when it comes to cyber criminals. The situation needs to…
Read More
According to the recently-released McAfee Labs 2018 Threats Predictions Report. It’s been a pretty scary year where cybercrime is concerned, with words like ransomware, malware and spyware becoming a part…
Read More
Cybercriminals alter the vendor’s website and replace legitimate apps with dubious ones that are meant to steal data from the user. If the ransomware got active in late 2016 with…
Read More