At present, corporate information security is not only a complex of technical means, such as anti-viruses or firewalls, it is already an integrated approach to managing the company’s assets in general and with information – in particular. Companies have different approaches to solving these problems. Today we would like to talk about the implementation of […]
Category: Cyber Security Terminology
What is ISO 27001? Information security (IS) issues for a modern organization are vital.The presence of an information security management system in accordance with the requirements of ISO / IEC 27001 will help an organization save its assets and ensure the integrity, reliability and confidentiality of information. Since 2005, more than 25 thousand companies worldwide […]
Modern hackers are able to hack absolutely everything, from airplanes, cars, sensor equipment and ending with locks with TSA function, voting booths and medical devices. The overall picture is even worse. Former director of the National Security Agency, Mike McConnell, suspects that China has cracked “all major corporations” of the United States. Edward Snowden found […]
It is a network of computers that are infected with malware to gain control of the device in order to organize DDoS attacks, mining cryptocurrencies, or sending spam. Almost any device connected to the network, including routers, may be vulnerable to obtaining remote control without the knowledge of its owner.
Attackers are using DDoS-attacks (Distributed Denial of Service – The distributed denial of service ) for the decommissioning of sites, or entire networks by overloading their requests, send a large number of devices. The suppressed service becomes inaccessible to ordinary users.