Data Privacy vs Data Security
Data security and privacy are popular within data security regulations that impose strict penalties on companies that ignore ongoing threats from cyber attacks such as malware and intruders. But even some IT professionals aren't clear about the difference between data privacy and data security.
Password Spraying Attacks: Detection and Defense Mechanisms
It is important to note that given the nature of password spraying attacks, you cannot prevent them, but you can detect and stop them in their tracks. This blog post describes how this type of attack unfolds, how to detect ongoing attacks, and how to reduce the risk of becoming the next victim.
The 'S' in HTTPS is For 'Secure' Not 'Safe'
"Ensure that the website you are browsing or entering confidential information such as usernames, passwords, or credit card information uses HTTPS." While this tip is vital to bear in mind when browsing the web, many misunderstand it, and this article seeks to set the record straight.
Part 1: The Beginning – My Journey to InfoSec
I began learning different programming languages to build programs I could share with friends. As none of my friends understood how I was doing what I was doing, and I felt like a genius. Wanting to re-live that feeling repeatedly, I began developing my programming skills more and more.
Caribbean Cyber Support Team Feature: Lomar Lilly
Lomar wears many hats under the umbrella of Information Security Consultant with Symptai Consulting Ltd in Jamaica and a member of the CCST group. He is passionate about the field of Cyber Security and enjoys giving clients peace of mind through his expertise.
Watering Hole Attacks: What are they?
In nature, predators hide next to watering holes, where prey gathers and wait for the opportunity to attack. Unfortunately, cybercriminals have found ways to emulate this predatory behaviour. They prey on unsuspecting victims browsing regularly visited websites. This is called a watering hole attack
Cybersecurity is Everyone’s Responsibility
40% of employees believe that they assume no responsibility for securing information. This thought is why many organizations place the responsibility of cybersecurity on their IT departments' shoulders, but adequate security must be a companywide endeavor.
These Search Engines are Great for Passive Information Gathering
The Information Gathering phase is the most critical phase of any penetration test. It is the first phase of every security assessment. Information Gathering focuses on collecting as much information as possible about a target.
Part 2: The Turning Point – My Journey to InfoSec
I enrolled in the module, “Software and System Security,” which gave me hands-on experience in other areas of Security, such as system and network security. I credit a lot of my exposure and development to this module even though I enrolled in every Security related module the University had.