“All races, all ages and all genders should be treated equally“ is the major agenda of Black lives matter But, surprisingly cybercriminals are now after the Black Lives Matter (BLM) movement and exploiting it t...
A data breach occurs when a cybercriminal successfully infiltrates the data source and extracts sensitive information. TechTarget defines a data breach as “an incident in which sensitive, protected, or confiden...
Just as pollution was the side effect of the industrial revolution, so are the many security vulnerabilities that come with the increased internet connectivity. Cyber attacks are the exploitation of those vulne...
We’ve never been more digitally connected, being in touch with the world around us has made us more vulnerable to hacks, data breaches, and identity theft. Being safe, well informed and secure are probably your...
In my 2 year stint at Deloitte, I’ve often come across huge organizations looking to chalk out an Incident Response Plan for them. To a layman or to even a businessman, Incident Response Plan (IRP) is an ...
The global pandemic of #COVID19 has made us business owners surrender to the Work from Home lifestyle with little notice and preparation. It has been difficult indeed and I’d be speaking for all leaders o...
As the co-founder of a cyber security firm, it deeply troubles me to see active internet users taking cyber security so lightly. The large scale implications of it are hard hitting, but in my experience, its th...