dcsimg

Google aims to banish third-party cookies within the next two years

Google, the Internet giant that serves more than 87% of worldwide web users, has given further details on its Privacy Sandbox initiative. Announced in August 2019, Privacy Sandbox aims to strengthen users’ online privacy, while protecting online publishers and advertisers. Google now says it wants to phase out support of third-party cookies within the next two years.   What is Privacy … [Read more...]

5 Security Mistakes CISOs Must Avoid in 2020

With every new security breach announced, the CISO position is becoming more and more trendy for organizations. However, CISO is not a new position – it’s just only now getting the attention it deserves. Outside of enterprises, we rarely see an organization or a startup with a CISO and this is a huge mistake. There … The post 5 Security Mistakes CISOs Must Avoid in 2020 appeared first … [Read more...]

A guide to the 4 PCI DSS compliance levels

The PCI DSS (Payment Card Industry Data Security Standard) contains a set of requirements to help organisations prevent payment card fraud. But did you know that the same requirements don’t apply universally? In fact, there are four PCI compliance levels, which are determined by the number of transactions the organisation handles each year. Level 1: Merchants that process over 6 million card … [Read more...]

Why MSPs’ Security Keeps Me Up at Night 

<p><i></i>For at least a few years now, the press has rightly brought attention to the fact that small-to-midsized businesses (SMBs) have increasingly become targets for cybercriminal activity. SMBs often contain valuable data, yet rarely have the security controls available to their enterprise counterparts.</p> Read More … [Read more...]

WEF Report: Cyberattacks Rank Just Below Climate Change as an Existential Threat

The vast majority of respondents to the World Economic Forum’s Global Risks Perception Survey expect cyberattacks against infrastructure and cybertheft of money/data to increase in 2020. Here’s why you should care. It’s no small irony that the publication of the Global Risks Report 2020 from the World Economic Forum (WEF) on January 15 happened to follow closely on the heels of one of the most … [Read more...]

Is SCP More Secure Than SFTP?

No. Fastest completion time ever OR maybe we need to go into more detail? Okay, to explain my conclusion, I need to go back to the origins of both protocols. … [Read more...]

Getting Started with Parallels Desktop for Mac Business Edition: Sign up for Parallels My Account

Mac® users in your organization can run business-critical Windows applications on their machines seamlessly and securely by using Parallels Desktop for Mac Business Edition. Save time and resources by simultaneously leveraging Mac and Windows capabilities and streamlining workflows.   The first step toward using Parallels Desktop Business Editing is signing up for Parallels … [Read more...]

WOOF locker: Unmasking the browser locker behind a stealthy tech support scam operation

In the early days, practically all tech support scammers would get their own leads by doing some amateur SEO poisoning and keyword stuffing on YouTube and other social media sites. They’d then leverage their boiler room to answer incoming calls from victims. Today, these practices continue, but we are seeing more advanced operations with a clear separation between lead generation and … [Read more...]

ISO/IEC 27701 and the privacy information management system requirements

ISO/IEC 27701:2019 is the international standard for privacy information management. It is structured in the same way as ISO/IEC 27001 – hence from the establishment of the privacy information management system (PIMS) through to its review and adaptation. There are also sections on performance evaluation and improvement. Addressing the requirements in this order, though, is not a requirement in … [Read more...]

What You Need to Know About Ethical Hacking

Meta description: Ethical hacking, in which an organization uses the tools and practices of cyberattackers against their own systems, can be a valuable part of your cybersecurity strategy.  Cybersecurity has been important, in some form or another, since the birth of the internet. In the early days, data breaches and hacks were relatively rare occurrences. But, now they are risks that impact all … [Read more...]