The IoT is happening all around us. One such notable elaboration in this area is drones. Drones, also referred to as unmanned aircraft systems, are quickly finding their way into IoT applications. It is estimated that the drone market may exceed $80billion by 2025. The possibilities for this technology are great however the security concerns (both cybersecurity and physical) must be addressed. Above all, the software utilised must be certified for safety.
The revised data protection laws for Europe have been agreed. By late May 2018 the regulation will be enforced – although at a glance this seems quite some time away, the amount of work and changes that most organisations must undertake to reach compliance with the new General Data Protection Regulation (GDPR) is extensive. We should not delay but rather begin preparations as soon as possible.
Macro attacks are on the rise. Microsoft suggests that 98% of Office-targeted threats are utilising macros presently. Let’s revisit macros, this old-fashioned form of attack – consider ways to deter the threat and look at the new Microsoft Office 2016 feature released to help defend organisations against the resurge in macro attacks.
Microsoft continues to improve their security tools. However, it is recommended that no matter how positively the security tools stand up to competitive third party tools that opting for the latter, in addition, for further security remains the right choice. Is adoption of the Defence-in-Depth approach always best practice?
In this article we will consider spear phishing techniques and the precautionary security measures organisations can take to aid them from falling victim to scams such as these.
This article looks at how technology impacts wireless security.