2-step and 2-factor authentication

The basics on 2-step and 2-factor authentication

Cybersecurity is a vital component to businesses these days. You need to make sure that criminals cannot just hack into your network. When it comes to verifying users’ identity, there are two types of authentication used: two-step and two-factor. These two are so similar, many confuse one with the other. Learn the difference between the two, so you’re more knowledgeable …

Warning signs your computer has malware

Warning signs your computer has malware

With the rise of eCommerce and online banking, cyber-crime has evolved. Like criminals who pull smash-and-grab jobs, they go where the money is. However, unlike bank robbers, cyber criminals do their best to avoid detection by letting malware do the work for them. Viruses and ransomware sneak into PCs to quietly steal passwords, financial credentials, and other personal information to …

Cyberthreats and the Finance Sector

The financial sector has long been heavily targeted by cybercriminals. Over the years, the number of Cyberthreats and attacks that involved extortion, social engineering, and credential-stealing malware has surged rapidly. This means that financial institutions should strive to familiarise themselves with the threats and the agents behind them. Here are seven new threats and tactics, techniques, and procedures that security …

Fileless malware: Are you at risk?

Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorised protocols to carry out malicious activities such as unauthorised data retrieval or data damage. It therefore pays to stay abreast of such threats. What is fileless malware? …

Not all hackers are cybercriminals

Not all hackers are cybercriminals

Newspaper headlines and Hollywood movies have shaped our understanding of computer hackers and made us look to them as cybercriminals, but in the real world it’s not so simple. Some hackers are making massive contributions to the field of cybersecurity, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black, and …

Here’s Why the Dark Web Matters

Here’s Why the Dark Web Matters

Most of the civilized world is on the Internet every day – businesses large and small, governments, educators, adults, children and, unfortunately, criminals. The Internet may seem like a world without boundaries allowing us to find just about any kind of information, learn about other cultures, conduct business across the globe and even socialize with family and friends. Like many …