June 17, 2021
Keeping the game on during Euro 2020
The most obvious motivation is financial gain, using the threat of a DDoS attack to hold them to ransom. Other potential motivations could include attacks on behalf of competitors, threat actors looking to use a DDoS attack as a diversion. The good news is that there are several ways to shore up your defenses. Increasingly, this involves stopping attacks from reaching the enterprise network by leveraging cloud-based managed services.
June 16, 2021
Five digitalisation trends transforming the finance function
At the heart of this digital transformation for finance and accounting teams is the potential for information technology and open data standards to reduce lags and latencies in the operations and processes. Based on these expectations, finance and accounting teams are focused on ensuring that their own function is equipped with the tools, technologies and talent for this digital transformation.
June 13, 2021
BackdoorDiplomacy attacks diplomats in Africa and the Middle East
BackdoorDiplomacy shares tactics, techniques, and procedures with other Asia-based groups. Turian likely represents a next stage evolution of Quarian, the backdoor last observed in use in 2013 against diplomatic targets in Syria and the United States.
June 9, 2021
An Edge Computing Breakup: Out with the Old, and In with the New
Edge computing is defined loosely as a model that brings computational, data storage and connectivity resources closer to the locations where they’re needed, saving bandwidth and accelerating response times. Edge technologies power millions of IoT applications in industrial, retail, healthcare and smart cities environments, and, prior to 2020, analysts expected an additional bump from virtual reality and 5G in the coming years.
June 8, 2021
The top 5 SMB vulnerabilities
Cyber protection brands like Acronis are always monitoring for dangers to your data, deploying updates to handle newly-discovered vulnerabilities, and issuing alerts and recommendations to help you stay protected. Our global network of Acronis Cyber Protection Operations Centers (CPOCs) continues to work around the clock to proactively detect and defend against the latest cyber threats.
June 8, 2021
Top 10 security Misperceptions
9 Commonly held misperceptions:1.we are not target as we are small/no asset.2. we do not need advanced technologies installed everywhere.3. we have robust security4. RDP servers can be protected by implementing MFA5. blocking IP from high risk regions6. our backups provide immunity7. our employees understand security8. data can be recovered even after ransomware attack9. paying ransomware to recover data
May 25, 2021
Cybersecurity & Business Continuity
Cybersecurity and business continuity are still mainly separated silos, but due to the cyber super highway's widespread exposure, there is a pressing need for firms to change their approaches in order to build business resilience.