E-Card Cyber Attacks on Valentine’s Day

Cyber security researchers always notice a spike in viral infections and scams around Valentine’s day. This is due to the prevailance of Valentine’s e-cards from secret admirers. If you receive an email similar to the one in the picture, do not click on the links and do not open any attachments, because there’s a big … Continued

Data Minimisation in GDPR

When it comes to storing processed data, the GDPR sets out some principles. Most importantly that data must stored for the shortest possible time and no longer than necessary. Legal obligations on how long that data can be stored must be taken into consideration. Storing the data for extended periods is only allowed for archival … Continued

From Phishing to Spearphishing

Phishing is sending an email to trick users into giving their confidential details. The more dangerous cybercriminal opportunists do Spear phishing. Whereas regular phishing targets various users that take the bait, spear phishing is aimed at particular users or groups, ideally for financial gain. The cybercriminal needs to gather information on the user or organisation. … Continued

Processing Sensitive Data

When processing sensitive data is desired, the confidentiality, integrity and availability of that data must be maintained at all times. Before collecting the data, there has to be a specified purpose for processing it within an agreed amount of time. Undefined purposes are not acceptable. Processing the data is limited only to the specified purpose … Continued

Multi-Factor Authentication aids Remote Monitoring and Management

Recently some Remote Monitoring and Management (RMM) software has been compromised. Management Service Providers (MSP) are helpless to stop it. In a matter of time, an attacker could get into your network, hijack the administrative functions, deploy ransomware to customers and go in for seconds. The answer to this problem is a Multi-Factor Authentication (MFA) … Continued

Digital Signatures do wonders

Digital Signatures are potentially becoming more popular than traditional handwritten ones due to their incorporation with legality and playing a vital role in data security and authentication. Those signatures make use of asymmetric cryptography and digital certificates, while adding a small extra cost. This makes them ideal for larger enterprises but expensive for smaller ones. … Continued