Clickshare, a Barco presentation tool can be abused by hackers

Clickshare, a Barco presentation tool, contains various vulnerabilities. This allows a hacker to watch during presentations or even hack the presentation PC. Clickshare Button van Barco © F-Secure The vulnerabilities have been discovered by the Finnish cyber security company F-Secure, which already informed Barco in early October. The Belgium technology company is now introducing a … Read moreClickshare, a Barco presentation tool can be abused by hackers

Reaching out to you

Hi friends and colleagues, I hope all is well! As many of you know, I have been at my current position as Senior Cyber Security Program Manager. In the former role of Cyber Security Range Manager, Cyber Academy, I was creating content for multiple clients worldwide, used for Cyber Awareness Education. I hate networking. It … Read moreReaching out to you

The Big List of Information Security Vulnerabilities

Information security vulnerabilities are weaknesses that expose an organization to risk. Understanding your vulnerabilities is the first step to managing risk. Employees 1. Social interaction 2. Customer interaction 3. Discussing work in public locations 4. Taking data out of the office (paper, mobile phones, laptops) 5. Emailing documents and data 6. Mailing and faxing documents … Read moreThe Big List of Information Security Vulnerabilities

IT Security Vulnerability vs Threat vs Risk: What are the Differences?

In today’s world, data and protecting that data are critical considerations for businesses. Customers want to ensure that their information is secure with you, and if you can’t keep it safe, you will lose their business. Many clients with sensitive information actually demand that you have a rigid data security infrastructure in place before doing … Read moreIT Security Vulnerability vs Threat vs Risk: What are the Differences?

Minimizing the Risks to Your Business Using Security Measures and Disaster Planning

Instituting the proper workplace security measures and planning for disasters coupled with the right insurance coverage, are vital components in minimizing the risks to your business. Running a business means you learn to expect the unexpected. However, when events that are totally out of the ordinary course of business occur, if you don’t have a … Read moreMinimizing the Risks to Your Business Using Security Measures and Disaster Planning

PRIVACY AND DATA PROTECTION IN THE UAE

      Published on January 24, 2019     Authored by: Prof. Dr. Ir. Henk Jan Jansen The protection of personal data and privacy considerations are more important than ever due to globalisation and technological development. Although there are no explicit laws or authorities that deal specifically with privacy and data protection in the … Read morePRIVACY AND DATA PROTECTION IN THE UAE

How to Think Like an Attacker

Executive Summary Organizations are increasingly finding themselves in a situation where existing information security defense strategies and solutions are failing. Attackers are bypassing defenses by crafting highly targeted attacks and advanced malware to achieve their goals. This report discusses strategies for refocusing information security priorities and resources to protect the business’ valuable intellectual property. While … Read moreHow to Think Like an Attacker

Different Security Models

Security Models Introduction The essence of information security is to protect information. It is just that simple. So whenever possible do not make it more complicated than needed. Complexity for cyber security and privacy arise when information needs to be shared or must be made accessible by some digital device. The world where information was … Read moreDifferent Security Models

Verified by MonsterInsights