Posts

Showing posts from November, 2020

Understand the 360 Degrees of Penetration Testing: Why, When and How

Image
Breaking down a company’s security protections required a lot of time and skills a long time ago. However, with today’s technological advances, finding an organization’s loopholes have become a piece of cake for the cybercriminals out there. Enterprise networks are facing non-stop attacks. Your business, institute or organization also can be a target of the cybercriminals in any minute. Ignoring these vulnerabilities can lead to system breaches, loss of personal customer data and affect the reputation of your business at the end of the day. Security and penetration testing is the only way to identify those exposures. So let’s give a break to your curiosity and start talking about “Penetration Testing”. What is Penetration Testing? Penetration testing is a common way for organizations to test their security maturity and identify potential vulnerabilities in a system (ex: application protocol interfaces (APIs), frontend/backend servers), network, or application. Poor architecture des

Let’s Mitigate the Cyber Treats in Video Surveillance

Image
2016 will be remembered as a year in which the physical security industry’s got backfired with their apathy towards cybersecurity with a massive distributed denial of service (DDoS) attack caused outages of influential websites like Amazon and Twitter. If you are familiar with the “Mirai Virus”, you may have a clue on what I am talking about. Mirai is a self-propagating botnet virus, which enters a camera by logging in using one of 61 default or common weak passwords that are capable of flooding any site on the web while still acting like a normal camera. It is estimated as 100,000 devices were hijacked by hackers, including network security cameras in this very incident. Got your attention now? Welcome to today’s focus, “Video Surveillance Cybersecurity”. What are the Potential Vulnerabilities of Your Video Surveillance System? A collection of equipment and software that provides security and safety can simply mention as a physical security system. CCTV (Closed-circuit television)

Are You a Victim of a Ransomware Attack?

Image
Have you ever experienced when you opened your computer to find it had been locked with a ransom note demanding cash immediately? In 2018 Ransomware attack grew by 350%   reaching a total of 812 million infected devices. Leave a small country like Sri Lanka behind. Let's take a powerful country like the United States. The Emsisoft Q1 and Q2 2020 research shows that in 2019 Ransomware attacks against 966 U.S. government, healthcare and educational entities cost $7.5 billion. Scary, right...!? Does your business, institution ready to deal with this cyber threat? Let's begin our journey through Ransomware!!!   Before we start, let's know what a Ransomware is. A Ransomware is simply a type of malware (malicious software) designed to deny access to the files on the user’s device. If you are a user, your computer is attacked by encrypting these files which only the malware operator can decrypt them. Ransomware is categorized into two main types as crypto-ransomware and locker ran