Data security and privacy are popular within data security regulations that impose strict penalties on companies that ignore ongoing threats from cyber attacks such as malware and intruders. But even some IT professionals aren't clear about the difference between data privacy and data security.
It is important to note that given the nature of password spraying attacks, you cannot prevent them, but you can detect and stop them in their tracks. This blog post describes how this type of attack unfolds, how to detect ongoing attacks, and how to reduce the risk of becoming the next victim.
In nature, predators hide next to watering holes, where prey gathers and wait for the opportunity to attack. Unfortunately, cybercriminals have found ways to emulate this predatory behaviour. They prey on unsuspecting victims browsing regularly visited websites. This is called a watering hole attack
"Ensure that the website you are browsing or entering confidential information such as usernames, passwords, or credit card information uses HTTPS." While this tip is vital to bear in mind when browsing the web, many misunderstand it, and this article seeks to set the record straight.
40% of employees believe that they assume no responsibility for securing information. This thought is why many organizations place the responsibility of cybersecurity on their IT departments' shoulders, but adequate security must be a companywide endeavor.
The Information Gathering phase is the most critical phase of any penetration test. It is the first phase of every security assessment. Information Gathering focuses on collecting as much information as possible about a target.
I enrolled in the module, “Software and System Security,” which gave me hands-on experience in other areas of Security, such as system and network security. I credit a lot of my exposure and development to this module even though I enrolled in every Security related module the University had.