The Vulgarisation of IT System Hacking Could Be Good News

business continuity hacks

Attack sophistication is growing. 20 years ago, social engineering had already made inroads and automated attacks were on the rise, with denial-of-service, browser executable attacks, and techniques for uncovering vulnerabilities in the binary code of applications.

IoT Device Security Doomsday on the Horizon?

Nobody is Safe from Cybercriminals 1

Does it sound strange that many organisations believe they are exposed to major problems with Internet of Things device security, yet few of them have taken any measures to resolve those problems?

IT Security and Strange Mobile App Permissions

malware

If you have already installed mobile apps on your smartphone to go beyond the stock selection provided with the device, you may well have noticed how a mobile app asks for permission to access certain resources or take certain actions.

The Great Business Continuity Risk-Reward Mix-Up

risk reward

Investors and financial institutions like to correlate business continuity risk with business continuity reward. If risk is greater in an investment, then the potential reward should be greater too.