Hitachi

U.S.A.

Hitachi Group Global Network

Americas

Asia

Europe

Middle East and Africa

Oceania

Close

Category: Cybercrime
You are here: Home \ Cybercrime
Posted on Tuesday, August 11th, 2020 by
The massive global influence of social media platforms such as Twitter and Facebook is testing our personal privacy to the limits. This is perhaps not surprising. The platforms have mass appeal, attracting everyone from the average person in the street to the President of the United States of America. With wide-scale adoption comes privacy and...

Topics: Canada Privacy Act, COVID-19, Cyber Law, Cybercrime, Facebook, GDPR, Law 64, Malware, Phishing, Privacy & Security, Ransomware, Social Engineering, Social Media, Spyware, TikTok, Twitter

Posted on Tuesday, May 26th, 2020 by
Monitoring the Dark Web protects against cybersecurity threats and provides a view of a world where cybercriminals gather to take advantage of your business. A recent trawl of the Dark Web found over 160 million data records, stolen from at least 12 companies, up for sale. These records contained personal data, including names, email addresses,...

Topics: Coronavirus, COVID-19, Cybercrime, Darknet Intelligence, Uncategorized, wfh, Working from home

Posted on Friday, March 13th, 2020 by
Response plans provide to organizations the appropriate mechanisms for minimizing risk, loss and damage resulting from incidents such as COVID-19. As you are now aware, COVID-19, aka the Coronavirus, has spread across almost every continent on Earth. The virus has caused massive upheaval and societal changes in an attempt to contain the virus spread: Italy...

Topics: Business Continuity Plan, Business Impact Assessment, Coronavirus, COVID-19, Cybercrime, Pandemic Response Planning, Response Planning, Uncategorized

Posted on Friday, January 17th, 2020 by
A Cybersecurity Posture Assessment gives your company the intelligence to know where you stand with respect to cybersecurity risk. The modern business faces cybersecurity challenges as never before. These challenges are being complicated by sophisticated techniques such as social engineering. Cyber-threats are compounded and facilitated through the hyper-connectivity offered by cloud computing, mobile devices, and...

Topics: Cybercrime, Cybersecurity Posture, Social Engineering, Uncategorized

Posted on Friday, January 10th, 2020 by
As cyber-attacks targeting cloud infrastructures increase, using a Cloud Security Posture Assessment can help you determine how best to reduce your organization’s risk. Indeed, cloud computing has become firmly established by organizations of all sizes and across all sectors. A cloud-based infrastructure facilitates digital transformation, offering opportunities to use best-of-breed cloud apps to help improve...

Topics: Cloud Security, Cybercrime, Cybersecurity Posture, Digital Transformation

People_Cybercrime_2019
Posted on Friday, December 20th, 2019 by
The state of people and cybercrime is reaching new heights. What do we mean by this? Cybercriminals are mastering the art and science of behavior manipulation. Phishing and other methods of social engineering are so prevalent that Proofpoint announced that 99% of all cyber-attacks need human intervention to proceed. In order to counter this, security awareness...

Topics: Cybercrime, Cybersecurity Posture, Deepfake, Penetration Testing, Ransomware, Social Engineering, Supply Chain

Latest Webinars | Watch Now

Cybersecurity, Cyber Crime and Your Business — How to Strengthen Your Cybersecurity Posture – In collaboration with Cytelligence

Watch Now

Cybersecurity 101 for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now

Introduction to Technical Security Testing for Credit Unions – In collaboration with the Caribbean Confederation of Credit Unions (CCCU)

Watch Now