How are deepfakes and cybercrime related? What is this recent deepfake trend? And what are some cybercrime examples of deepfake technology?
Back in 2018, researchers found 14,698 deepfake videos online. But what is this phenomenon about and how will it affect businesses and individuals in the years to come?
How can credit union professionals strengthen their cybersecurity posture? Much like banks, credit unions hold large amounts of highly sensitive data about members, including financial and personal information such as credit scores, banking information and investment history.
In this blog article, we'll talk about why cybersecurity is important for credit unions, how credit unions can evaluate and improve their cybersecurity posture, and which first steps credit unions should undertake to strengthen their security defenses.
How can today’s cyber-aware businesses prevent social engineering attacks? In this blog article, we look at some techniques and measures that an enterprise can use to protect their network and resources against the scourge of social engineering-based cyber-attacks, including security awareness training, phishing simulation, cybersecurity posture assessments etc.
What exactly is social engineering and how does it work? In this blog article, we talk about this very popular (ethical) hacking practice, describe how and why it works and provide a breakdown of a socially engineered scam.
To manage the increasing cybersecurity spend and to ensure specialist coverage, a growing number of companies is outsourcing security projects to a Managed Security Service Provider (MSSP). What are the general benefits of engaging with an MSSP, as opposed to managing your security in house?
In this blog article, we look at some of the general reasons why outsourcing cybersecurity protection may be a good idea for your business.
The darknet has become a digital marketplace where much of the stolen data we hear about ends up. There are many reasons for buying someone else’s data, including to commit ID theft, financial fraud, and even for some, the odd bit of blackmail.
In this blog post, we will look at how our personal data ends up in the hands of the bad guys via the darknet.
Based on the OWASP ‘Top Ten Cloud Security Risks’, we explore each of the top 10 Cloud security issues when using a Cloud-based environment. 1. Accountability and Data Ownership 2. User Identity Federation 3. Regulatory Compliance ...
In today’s digital world, companies of all types and sizes need to protect their critical data assets against cyberattacks and data breaches. Privacy obligations such as GDPR, CCPA and PIPEDA have required organizations to step up their privacy game to demonstrate compliance with mandatory privacy breach notification, reporting and record-keeping.
Although more and more organizations have implemented basic compliance exercises, many are still at a loss when it comes to managing, monitoring and reporting on their privacy obligations. This blog article answers key questions about how organizations can leverage strategic reporting frameworks to understand their inherent risks, determine their target maturity and report effectively on their various data privacy obligations.
If you look at the title of this blog article and aren’t sure what to answer, you’re not alone. Even industry veterans find it hard to disentangle cybersecurity and data privacy. There is a good reason for this. They are associated, even intrinsically linked, and they both have to deal with nefarious elements that would do...
Are you struggling with managing several cybersecurity projects at the same time? Would you like some guidance when selecting the “right” cybersecurity projects for your business context? Do you have a feeling that you could manage them more effectively, for your own sake and for the sake of your organization?
If you’ve answered yes to any of these questions, we’ve compiled several best practices that can help you manage your cybersecurity projects more effectively.
Hitachi Systems Security is a Global IT Security Service Provider who builds and delivers customized services for monitoring and protecting the most critical and sensitive IT assets in your infrastructures 24/7