Top 5 Cybersecurity Threats to Watch in 2020

My Post (2).pngThese days, cybercriminals are ambitious and innovative, with no shortage of tools and resources at their disposal to go after high-stakes targets and execute malicious code — all while flying completely under the radar.

To prepare you for what’s ahead, below are five of the top cybersecurity threats you might encounter in 2020.

Misconfigured Cloud Environments Set the Stage for Damaging Attacks

Cloud misconfigurations have been responsible for some of the most egregious breaches in recent memory. Last year, a Seattle-based hacker exploited a misconfigured web application firewall to access files of a major financial institution hosted on AWS S3 servers, resulting in a data breach that compromised the personal information of 100 million credit card customers. Unlike other threats, this security problem originates internally — often as a simple mistake that’s made during the deployment of cloud resources. This also paves the way for insider threats on cloud deployments. Yet even accidental oversights can result in costly and destructive breaches that will only become more pervasive as hackers increasingly turn their attention to the cloud.

Phishers Cast a Wider Net

As one of the cheapest and most efficient methods of reaching targets at scale, it’s not surprising that phishing is one of the leading causes of data breaches, according to the Verizon 2019 DBIR. However, hackers are upping their game with a myriad of advanced techniques. Phishers are targeting numerous business SaaS applications —  now accounting for 36% of all attacks — and are continuing to use personal information shared on numerous social media sites to create more authentic-looking, interpersonal messages. As a result, these attacks are becoming increasingly difficult to identify — even for the most tech-savvy users.

Malware Authors Up Their Game

Malware grew by leaps and bounds in 2019, and shows no signs of slowing down in 2020. According to AV-TEST, cyberattackers pushed the total number of known malware samples over the one billion mark — with attacks that are more sophisticated than ever before. Fileless malware attacks – malicious code that executes by piggybacking on legitimate software – are continuing an upward trajectory, along with new forms of “stalkerware” — spyware that tracks victim smartphone data to generate a big-picture view of their activities. On the ransomware landscape, new families are targeting high-value business data while others such as Maze are punishing victims who fail to pay up.  Read More


Learn More About SPLUNK

Coronavirus: Manage deploying working from home

My Post (1).pngWith no end in sight to COVID-19, for many people, a period of remote work is looking more and more inevitable. What we thought was the norm yesterday has changed and moved to a new norm today and so forth.

Many businesses are now implementing Working-from-Home (WFH) policies to ensure business continuity and to comply with the latest Government restrictions and advice.

Here are some tools companies can use to manage this new way of working using the latest technology with employee management systems;

  • Mobile App Sign in – allow your employees to sign on from home using their mobile phone and pinpoint their geo-location. You can ask them to select a pre-determined zone or add in a free text field ie. home address
  • Sign in Notifications – receive an email or SMS notification when your employees sign on and off for the day or you may choose just to view this data on a live dashboard.
  • Dashboards – have a clear view at any given time wherever you are of who is currently signed on or off in real-time data. View from your home PC or any smart device.
  • Online Working From Home Agreements – send out electronic WFH Safety Policies and Agreements that employees need to acknowledge. Send employees automated prompts if they haven’t completed the agreement before they commence WFH (this is an automated check upon sign in using the mobile app).
  • Questionnaires upon sign-on – build a questionnaire to be completed daily when employees sign-on. You can easily change the questions instantly for another day. All the data is collated into a spreadsheet and you can trigger actions automatically based on answers to any of these questions.

– Read more


Learn More About Visitor Management System

Remote Work 101: Essential Tips for Working From Home

My Post.pngConsidering all the benefits of working from home, it’s no surprise many believe telecommuting is the future of employment. And we don’t need to look into our crystal ball to see that prediction becoming a reality 🔮

survey by Owl Labs and Global Workplace Analytics found that 51% of on-site U.S. workers would like to work remotely in the future. Another 30% would consider it as an option (2019).

Not bad, huh?

The same report shows that employees turn to telecommuting for a number of good reasons. Increased job satisfaction, reduced stress and fewer workplace conflicts seem like a good start. When we add perks like no daily commute, flexible work schedule and— wait for it— reduced carbon emissions, working from home becomes pretty compelling.

But while the benefits of telecommuting are easy to understand, managing a remote work lifestyle…not so much. 🤷🏻‍♂️ Working from home requires careful planning and the kind discipline that rarely comes naturally.

Luckily, we have a handful of tips that’ll help you find and cultivate a healthy work-life balance. – Read more


Learn More About Taskade