Tag: security

A Guide to Authentication Methods (Infographic)

Stolen passwords and weak passwords are responsible for over 80% of security breaches in 2018, and in 2019 over 150,000 security incidents and nearly 4,000 confirmed data breaches were caused due to weak or stolen passwords. Passwords are some of the weakest forms of authentication, and when user authentication is not secure, cybercriminals have easy access to take whatever information they want.    Creating the perfect authentication method does not …
[Read More]

Why Continuous Security Testing Is Crucial for Business Survival Now More Than Ever

Cybersecurity has become a top priority for businesses. Most organizations have already adopted capable security solutions to protect their networks from attacks. Unfortunately, these solutions may not be enough.  Since the start of the coronavirus pandemic, hackers have been reported to be ramping up their attacks. They look to prey upon the many businesses that were forced to shift to remote work. Companies are adopting new apps and devices which …
[Read More]

Keeping Safe From Phishing During COVID-19

Email, while a helpful resource and an effective communication tool, has been taken advantage of by scammers and hackers for decades. Phishing is a common attack used to get victims to click a malicious link – in 2018 alone, over 80% of people received phishing emails and over 60% of businesses experience phishing attacks. These attacks are hard to spot as they don’t target the tech but they target human …
[Read More]

Domen Zavrl: What Is Cryptography?

Cryptography is a field of information security that is often misunderstood. Although the fundamental principles of algorithms generally stay the same, as infections and attacks evolve so too must these algorithms to maintain the security of confidential information. Cryptography incorporates three key principles: encryption, integrity, and authentication. Encryption To encrypt a file data is converted into an unreadable form, protecting its privacy during storage, transfer and reception. Encrypted data is …
[Read More]