MENU

Posts Tagged ‘Credence Security’

  • App permissions can be used to exploit your data

    October 24, 2018 • Security, Top StoriesComments Off on App permissions can be used to exploit your data

    Every time an application is installed on a device, the user is asked to allow that app certain permissions. These range from being able to view your contacts, to using your camera and microphone, tracking your location, and many, many more. While some of...

  • How AI, machine learning boost cyber security

    How AI, machine learning boost cyber security

    October 3, 2018 • Security, Top StoriesComments Off on How AI, machine learning boost cyber security

    The last few years have seen a massive rise in the number of data breaches affecting major organisations. Alongside this, security challenges are changing fast. Pimply hackers in basements have morphed into sophisticated criminal networks, and viruses have...

  • Being prepared is key to mitigating cyber attacks

    July 10, 2018 • Security, Top StoriesComments Off on Being prepared is key to mitigating cyber attacks

    In an age where cyber criminals are a dime a dozen, and the threat landscape more complex than ever, it pays to prepare and be always on guard. This means being up to date with the strategies and tricks used by cyber adversaries, and investing in monitoring...

  • Boosting cyber resilience

    July 3, 2018 • Security, Top StoriesComments Off on Boosting cyber resilience

    Barely a week goes by without a story of how another major organisation has been compromised. Whether millions of IDs were stolen, or personal data compromised, it’s clear that no business, irrespective of the money they throw at security solutions, is...

  • Beware of cybercriminals who prey on holiday shoppers

    Building a cyber-secure organisation

    March 13, 2018 • Opinion, SecurityComments Off on Building a cyber-secure organisation

    Although the vast majority of businesses today are aware of the dangers of cyber crime, too many acknowledge that they are not really effective at preventing breaches and other security events, and are not confident in their ability to recognise that a...