Browsing tag

BYOD

The growing security problem of Bring Your Own Device (BYOD)

Computers, technology, and the internet have brought unmistakable advantages to firms in recent years and have revolutionized how most companies operate these days. However, new tech’s tremendous benefits have come the significant dangers of operating online and the alarming rise in cybercrime globally. In 2021 alone, internet-based crime is expected to total $6 trillion – […]

How SASE Supports Digital Transformation

Digital transformation is a buzzword but it’s also a primary goal of many organizations. With the ability to see past the pandemic, many organizations are looking forward to how they can grow into the future. The ongoing evolution of technology means that these organizations have many options to choose from. However, securing these new devices […]

Complete Guide & Best Practices for Enterprise Mobile Device Security to Protect From Malware Attacks

Nowadays, employees, customers, and stakeholders at all levels are adopting BYOD onboarding practices. Fortunately, it’s entirely possible for companies to restrict network access until clients have been approved. If a user brings a tablet, phablet, laptop, or smartphone from home and attempts to connect to a Wi-Fi network, these connections can be redirected to a […]

“Human Error” Is The Biggest Corporate IT Issue

Here in hackercombat.com, we feature stories of virus infection, phishing incidents and other issues involving private and public sectors because of external risks. However, IT troubles in companies are not really made by outsiders, but human error inside the organization. It is necessary to think about how employees really think about the notion of “do […]

Corporate IT Security Starts With Simple Policies

Frequent readers of hackercombat.com should be fully aware by now that cybercriminals of all sizes mean serious business. The old days of script kiddies vandalizing a website or pulling off a publicity stunt for their 15-minute of fame online are a rare occurrence these days. Cybercriminals are enticed by the real plausibility of profiting from […]

68% of Firms, Moderate to Extremely Vulnerable To Internal Threats

With malware infestation, data breaches allegedly caused by state-funded actors and phishing attacks becoming headlines in both mainstream media and tech news sites, it is still not the main cause of concern for IT professionals. In a recent survey of IT professionals, 73% of the respondents believe that the main cause for concern is attacks […]

U.S. Cyber Attacks Against Russia’s Federal News Agency

The United States military has publicly disclosed that it launched a cyber attack against Russia’s Federal News Agency (FAN), the news website arm of the Russian Internet Research Agency (IRA). The U.S. instigate the cyber attacks against what it considered as an alleged Russian-hosted “troll farm” which the U.S. accused of mass producing fake news. […]

How To Reverse The Trend Of Increasing Security Breach

The enormous trend of data loss due to the growing number of Data Breaches, that is the sad reality of today’s technology-dependent and obsessed world. This is the overall picture painted by the recently released Gemalto’s 2018 Breach Level Index. The report has revealed that around 3.3 billion user files of varying importance were lost […]

The Small, Medium-Sized Enterprise vs Cyberthreats

“Small and medium-scale enterprises created jobs and strengthened support industries in domestic economies. While foreign direct investment from developed countries and the transfer of technology could aid the small and medium-scale enterprises, the local support for such enterprises must also be strong. Governments should provide a favorable environment to support the development and growth of […]