Office-resources-banner

How to implement a Cyber-Secure culture?

How to implement a Cyber-Secure culture?

A Cyber-secure oriented company is essential for your Cybersecurity efforts

Cybersecurity is an important topic in every organisation, it's a constant concern for IT leaders and it can be a headache for IT professionals in general. The end-users can be affected as well, as usually are the ones who tend to get trapped clicking where they shouldn’t and opening suspicious emails. So, why still so difficult to have a company culture focused on Cyber-safe actions and attitudes? The answer is Leadership.

Thursday, October 17, 2019/Author: Suellen Machado/Number of views (244)/Comments (0)/ Article rating: 5.0
Categories: Cybersecurity
IoT Devices and its Cyber risks

IoT Devices and its Cyber risks

IoT devices are rising and bringing new cybersecurity risks

Internet of Things is a way without coming back. According to Gartner, there are over 8 billion connected “things” in use today, and the figure will top 20 billion by 2020, including over 7 billion specifically for business use. As organisations embark on digital transformation projects, bringing IoT devices closer to users’ reality, a new cyber risk emerges. How to keep those devices safe and control the potential cyber attacks?

Wednesday, September 25, 2019/Author: Suellen Machado/Number of views (150)/Comments (0)/ Article rating: 5.0
Categories: Cybersecurity
Report Reveals the Major Cyber Breaches in 2019

Report Reveals the Major Cyber Breaches in 2019

Check out the main Cyberattacks which are rising this year and be aware of the risks to your company

Check Point released their 2019 Mid-year report with the major cyber-attacks in 2019 revealing that European companies in general still at risk of cyber breaches and attacks, putting at risk sensitive information of billions of people. What characterizes 2019 is not the number of reported breaches, but rather their magnitude.

Thursday, September 19, 2019/Author: Suellen Machado/Number of views (731)/Comments (0)/ Article rating: 5.0
Categories: Cybersecurity
Data Breaches on the Spotlight in the Cybersecurity 2019 Review

Data Breaches on the Spotlight in the Cybersecurity 2019 Review

Check out below the latest Cybersecurity attacks and breaches affecting worldwide companies

The first quarter of 2019 was busy for Cybersecurity professionals in general. Even though people are more aware of cyber-attacks and threats, crimes related to cybersecurity still on the rise and putting companies at risk. According to the last Risk Radar report released by Integrity 360, billions of compromised records, data leaks from cloud misconfigurations and record-setting cyber-threats were some of the main findings for the first period of the year. On the other hand, the lack of qualified professionals is not helping the situation either.

Friday, June 7, 2019/Author: Suellen Machado/Number of views (221)/Comments (0)/ Article rating: 5.0
Categories: Cybersecurity
How to build up your Cisco Security Career

How to build up your Cisco Security Career

Cybersecurity professionals are in high demand, check here to know how to structure a successful Cisco Security Career

The potential and real risk of a cyber-attack is a constant headache for IT professionals and Cybersecurity specialists. Cyber criminals are continually scheming new ways to infiltrate corporate networks and frequently they succeed. In 2017, 1,579 data breaches were reported in the U.S., up 44.7 percent from 2016. The figure is not different all over the world demanding more Cybersecurity professionals and opening new opportunities in companies everywhere.

Thursday, January 17, 2019/Author: Suellen Machado/Number of views (587)/Comments (0)/ Article rating: 5.0
Watch Now - How the FBI Caught the Worst Spy in American History

Watch Now - How the FBI Caught the Worst Spy in American History

How training can help identify hackers, hacktivists and trusted insiders that threaten every stroke of the keyboard.

Now join Eric as he uses real-life spy stories to show how careful diligence, counter espionage techniques and top-notch training can help identify the numerous spies, hackers, hacktivists and trusted insiders that threaten every stroke of the keyboard.

Tuesday, December 18, 2018/Author: Suellen Machado/Number of views (725)/Comments (0)/ Article rating: 5.0
RSS

Theme picker

Loader

Categories

Subscribe to our Newsletter

cheat sheet resources

Subscribe to our Newsletter for all the latest cheat sheets and resources.

Subscribe

Tech-Events-Ireland-vertical