Working at CSIS

Are you looking to work with CSIS which one of the worlds most powerful intelligence cooperation? In case you have been trying to figure out this, then stay put and get informed on how you can realize your career dreams of getting a job at the CSIS. Although many people believe that getting such a… Read More

Are You Using The Most Hackable Password?

More than 23 million people have used the world’s most hackable password. How many passwords do you have to remember? Email accounts, social media platforms, online bill pay, online banking and online retailers all require passwords. For convenience, over 23 million of us chose 12345 as a password and ended up being hacked. This is… Read More

Air Force Has a New Cyber Security Defence Plan

Cyber Security Lessons from the U.S. Air Force Of all the branches in the United States armed services, the Air Force is known to always be at the forefront of information technology, particularly in terms of cybersecurity. Over the next few years, the Air Force will augment its cyber defence systems with advanced cloud protection,… Read More

Health Care’s huge Cyber Security Problem

Cyber attacks in the healthcare industry are becoming widespread as seen with diagnostic tools being infected by malware that forces the user to pay a ransom before shutting down the monitoring system. These viruses were sent to hospitals which could disrupt patient care by hijacking drug administration, stealing data about patients, or even shut down… Read More

Snort Rules: An Introduction

According to cyber security experts, small businesses experience the following types of attacks. They include web-based, phishing, general malware, SQL injection, and DDOS. Based on research, 43% of cyber attacks target small businesses. In a survey, the average cost of stolen records with sensitive information was $141 in 2017. Experts also found that companies with over 50K stolen records… Read More

Government of Canada issues cyber security guide for Small-Medium sized Businesses

Many small and mid-sized businesses are concerned about encountering cyber security breaches because they don’t have the budget to hire infosec professionals to monitor their infrastructure. As a solution, the Canadian government issued a guide on baseline Cyber Security controls for SMBs. One example would be to automate software updates in a single patch. While… Read More

How to Begin a Career in Cybersecurity

Cyber security is in hot demand right now, with data breaches more common than ever before. It is an evolution of information security since this project involves the protection of data, regardless if it’s sensitive data pertaining to people, projects or financial information. According to the latest estimation from securitymagazine.com, 80 percent of IT businesses… Read More

5 Top Cybersecurity Threats We’ll Face in 2019

Last year saw an estimated 1,244 US data breaches with over 400 million records exposed. Are industries better prepared this year to defend against attack? An essential part of strong security is knowing the year’s top cybersecurity threats. This includes familiar threats like ransomware and unfamiliar threat trends too. Digital trends like Internet of Things will see… Read More

How The Internet of Things is affecting Cyber Security

The Internet Needs to be Secured Right Away Always The concept of security is a simple thing. Security makes things safe to use and live within everyday situations. The more complex the system, the more it requires sophisticated security in play to ensure things operate according to plan. Nowhere does this truth apply better than… Read More

The 13 Most Important Skills to have as a Cyber Defender

The information security professionals of today have a requirement of learning more swiftly, communicating more effectively, containing more knowledge about the business, and matching the ever-improving capabilities of adversaries. Not so long ago, to survive in this field, all you needed was creativity, problem-solving, and a healthy dose of technical understanding. But today, the security… Read More