The British low-cost airline EasyJet announced days ago that suffered a “highly sophisticated cyber attack”, which has affected more than 9 million customers worldwide and that important personal data, including more than 2,200 three-digit security code (CVV) had been stolen. From the end of May, the company has been warning customers whose email addresses had been stolen to be extremely wary of phishing attacks.
The ability to work from anywhere means that IT must prioritise user-experience. Access to private applications should not require VPN or waiting for traffic to be backhauled to a datacentre just to go out to public cloud. Gartner predicts that in the aftermath of COVID-19, 74% of companies will move some employees to remote working permanently. Are your security and mobility teams prepared for working remotely anywhere?
What would you do if you are the manager of a small business and your IT infrastructure, storage data, and services are disabled by a ransomware attack? UK companies have experienced an average of more than 1 cyber attack per minute in 2020, according to a recent report from the cyber security industry.
The rise of sophisticated malware is a dangerous threat for remote workers and organisations. Besides the normal cyber threats, cyber attacks are being carried out by different countries targeting some key sectors, where personal data is found. Robust cooperative security malware protection across the organisation and segmenting the network to prevent threat propagation are key to securing your organisation’s network.
Most IT leaders believe remote workers are a security risk for their organisations amid lockdown, as they can expose their company’s network to the threat of a data breach. A new survey by cyber security providers, shows 57% IT decision-makers in the UK believe workforce remote practices put the organisation data under threat. This figure has inclined steadily from 44% in 2018 and 50% in 2019.
Last year, 47% of IT leaders in the UK admitted their remote workers had already knowingly put corporate data at risk of a breach; this has now dropped slightly to 44%.
Self-isolation, social distances, lockdown… the coronavirus has upended almost every aspect of our lives. Anxiety, stress, or sleep insomnia have spiked around the globe. Everybody feels on the edge, and hackers and cyber criminals play with these emotions to their advantage. Now, cyber threats are increasing as COVID-19 continues to cause global panic.
Organisations’ online assets are critical to business performance and during these current circumstances, cyber attackers are not losing the opportunity to exploit weaknesses, whether they are technical flaws our cloud misconfiguration, which can prove very costly and damage a company’s reputation.
In light of the current shifting dynamics that are forcing everyone to work from home (for a much longer than anticipated amount of time), we must all adapt and now gain visibility of a decentralised environment to be able to quickly detect and respond to security issues as they still continue to arise - if not more so, as bad actors are taking advantage of the Covid-19 situation.
A vulnerability assessment is a key responsibility of any IT security team or managed security service provider. It helps to report on any security vulnerabilities that exist in an organisation’s system and software.
Vulnerabilities can be managed only if they have been discovered and identified. RedSpam offers two distinct scanning engines designed to test Web Applications and computer systems for vulnerabilities.
RedSpam Security Assessment Step-by-Step
The spread of COVID-19 is one of the biggest and most unpredictable obstacles business owners have ever had to tackle. You and your team may be facing some difficult decisions and feel like you’re at crisis point. Or you’re in unknown waters when it comes to moving forward with your business during this emergency. At RedSpam we appreciate with the current worldwide situation companies are putting their resources on hold, but this current climate is a hotbed for cyberattacks.