With every new tablet, computer, GPS system in a vehicle and even healthcare assets like pacemakers, the opportunities for cyber criminals appear to be endless.
As a result, cyber crimes are becoming increasingly sophisticated, techniques have evolved which is why here at BullGuard we do our best to keep you educated on the latest updates so that you’re always one step ahead of the cyber criminals.
Have you heard of the Password Management Paradox?
Does your company make you change your password every 30 to 60 days, leaving you constantly forgetting what your password is? If you nodded yes to that question, you have found yourself in the Password Management Paradox. The idea behind it being, the more passwords we have to remember, actually decreases security; either you’ll ignore the requests to update your password, or you’re constantly on the phone with IT resetting your lost passwords.
A recent report about the hacking of financial services organisations reveals an industry that is almost under siege. According to the survey, during 2013 about 1,400 financial institutions were targeted across 88 countries.
During the first 9 months of 2013 the number of Trojans targeted at banks grew by three times compared to the same period the previous year. Somewhat obviously, the report’s authors also say concerted cyber crime directed at banks was first noted when online banking started becoming mainstream, about 10 years ago.
As employees acquire more and more remote devices, such as laptops, tablets and mobile phones, it becomes increasingly more difficult for companies to protect the devices and the valuable data stored within each one. A recent study showed that companies are often still unprepared when it comes to security breaches and providing their employees with remote support technology.
This is big! The UN has passed a draft resolution on ‘potential threats to human rights such as the right to privacy in the digital age’. The draft was passed by a vote, with the UN calling upon its members to ‘review their procedures, practices and legislation regarding the surveillance of communications, their interception and collection of personal data, including mass surveillance, interception and collection, with a view to upholding the right to privacy by ensuring the full and effective implementation of all their obligations under international human rights law”.