Understanding the Internet of (Hacked) Things

Imagine a scenario when your alarm clock is connected to the internet, and accesses your calendar to know when and where the first appointment of the day is. It simultaneously cross-references that against the latest traffic conditions, depending on which you can sleep a little longer or wake up earlier. The curtains in your bedroom open, … More Understanding the Internet of (Hacked) Things

Social media, cloud and phishing: Evolving trends in cybercrime

*Gaurav, a finance manager in a multinational company, rose to attention one Monday morning as he received an email from *Shephali, the company’s chief financial officer (CFO). The email directed him to urgently make a payment of $10,476 toward an attached invoice to a Cyprus-based vendor. Gaurav instantly initiated the process, bypassing some of the … More Social media, cloud and phishing: Evolving trends in cybercrime

Data Privacy Day – why it should matter to you…

Privacy, a term that we seldom take enough cognizance of, is gradually changing form. In this technologically infused age, where virtual identities have now taken precedence in our personal and professional lives, the concept of data privacy has become inevitably important. The celebration of Data Privacy Day on 28 January each year that was initiated in … More Data Privacy Day – why it should matter to you…

Ransomware malware: a rising threat to businesses

In this day and age, everyone is troubled by the menace of computer malware — unwanted and malicious software code that hacks computer systems, causing malfunction, data theft and loss of business. Typically, malware tends to rapidly spread to targeted and non-targeted individuals and businesses, making it one of the major threats in today’s digital … More Ransomware malware: a rising threat to businesses

Strengthening network security through proactive monitoring

In July 2001, Counterpane Internet Security, a new start-up firm released their free monthly newsletter covering various topics related to computer security and cryptography. The primary focus of that edition was “Monitoring First” and the articles laid emphasis on the need to monitor networks and systems before anything else. It recommended that companies need to … More Strengthening network security through proactive monitoring

Don’t let there be a ‘chink in your chain’ in combatting cybercrime

Technology and the internet have permeated through to every aspect of our lives, slowly percolating their way into businesses functions. While it has helped transcend boundaries and collaborate at a pace which was not thought possible even a decade ago, the side effects come with a similar momentum. The gaping vulnerabilities which seem to surface … More Don’t let there be a ‘chink in your chain’ in combatting cybercrime