Cybersecurity fatigue a growing risk in the age of AI-driven attacks

Although the tactics and technologies cybercriminals use have evolved over the past 20 years, phishing and other social engineering attacks are nothing new. But despite the significant amounts of time and money invested in cybersecurity training and awareness,...

Protect digital ID with phone number security

Phone numbers have evolved into essential identifiers, akin to personal IDs and crucial for logging into numerous online services ranging from social networks to banking apps. As such, control over these digits is pivotal, with their loss potentially leading to...
Digital world makes defending against more relevant

Digital world makes defending against more relevant

In a hyper-connected, always-on world, both citizens and businesses must develop robust, multi-layered cybersecurity strategies to combat the flourishing cybercrime ecosystem. By Michael de Neuilly-Rice, cyber security architect at NEC XON These illicit markets have...
SMEs, you are the low hanging fruit for cybercriminals

SMEs, you are the low hanging fruit for cybercriminals

According to an IBM report, on average it takes nearly 287 days to detect and contain a data breach. A lot of damage can be done in such a long period of time. For one thing, your reputation can go down the drain along with your dream of selling this great little...