Healthcare Cybersecurity: Are your medical records safe?
CYBER DEFENCE | CYBER SECURITY

Healthcare Cybersecurity: Are your medical records safe?

As each day comes, Cyber-attacks and data breaches are increasing in the news and the types of cyber-attacks are becoming more varied and sophisticated. Malicious hackers have developed better ways to evade basic security, they have mastered social engineering, and they have also transitioned from mere petty theft, to information and data theft. That information,…

Understanding DoS and DDoS Attacks
CYBER SECURITY

Understanding DoS and DDoS Attacks

Recently, A 23-year-old hacker from Utah who launched a series of DDoS attacks against multiple online services, websites, and online gaming companies between December 2013 and January 2014 was sentenced to 27 months in prison. Austin Thompson, a.k.a. “DerpTroll,” pledged guilty back in November 2018 after he admitted to being a part of DerpTrolling, a…

MALWARE ON THE RISE: REINFORCE AWARENESS
CYBER SECURITY

MALWARE ON THE RISE: REINFORCE AWARENESS

More often than not, hackers are working around the clock to breach systems with a multitude of social engineering techniques and malware. Attackers are using malware to encrypt computer files and demand ransom to make them accessible again. People are typically the weakest link, and because an organization relies heavily on its human resources, due…

How safe is Network from Hackers?
COMPUTER SECURITY

How safe is Network from Hackers?

Recent hacks on some of the world’s most sophisticated technology companies have showcased another kind of cyber-criminal, one that includes foreign governments and organized crime cartels, unconstrained by social norms and backed by nearly unlimited resources. As attacks become ever more clever, is any computer user really safe? If you are dealing with a well-established…