Category: Uncategorized

Uncategorized

Cybersecurity after COVID-19: Securing orgs against the new threat landscape

Cybersecurity after COVID-19: Securing orgs against the new threat landscape Picture this: An email comes through, offering new COVID-19 workplace safety protocols, and an employee, worn down by the events of the day or feeling anxious about their safety, clicks through. In a matter of seconds, the attacker enters the network. Factor in a sea of newly…

Uncategorized

Top sulmet më të mëdha kibernetike në Kosovë 2020

Top sulmet më të mëdha kibernetike në Kosovë 2020 Rëndësia e sigurisë kibernetike për gjdo biznes ka peshën dhe vlerën e sajë. Mungesa e vetëdijësimit të bizneseve në Kosovë në fushën e sigurisë kibernetike në vitin 2020 ka sjellur sulme kibernetike të cilat kanë ndikuar në zbulimin e të dhënave personale të klientëve, llogarive bankare,…

Uncategorized

Most cyber-security reports only focus on the cool threats

Most cyber-security reports only focus on the cool threats Academics: Only 82 of the 629 commercial cyber-security reports (13%) published in the last decade discuss a threat to civil society, with the rest focusing on cybercrime, nation-state hackers, economic espionage. The vast majority of reports published by the cyber-security industry focus on high-end economic espionage…

Uncategorized

5 Questions Public Leaders Should Ask About Cybersecurity

5 Questions Public Leaders Should Ask About Cybersecurity Elected officials, agency heads and other government leaders need to understand their organizations’ challenges and issues. It’s the key to establishing a shared culture of security in a public organization. If you are a government information-security professional, one of the recurring conversations among you and your peers…

Uncategorized

What cybersecurity teams can learn from COVID-19

What cybersecurity teams can learn from COVID-19 Nabil Hannan examines key similarities between medical and computer viruses that cybersecurity teams can use to keep businesses protected effectively. There’s a reason why a computer virus is called a “virus,” as they have many similarities to medical viruses. Notably, as medical viruses can have a severe impact…

Uncategorized

Cyber Security Best Practices: Post COVID Remote Work

Cyber Security Best Practices: Post COVID Remote Work In the wake of the COVID-19 pandemic many businesses and employers have begun to rely on their employees working primarily or even exclusively remotely.  As a result, many employees are utilizing either their own smartphones, tablets or laptops and other mobile devices or those provided by their…

Uncategorized

How to Invest in Cybersecurity

How to Invest in Cybersecurity The threat of cyber-attacks on companies and individuals has ramped up exponentially in recent years. That’s good news for the businesses promising to provide protection. Cybersecurity has become one of the most important areas for companies to spend on in recent years. The theft of data or personal details, or…

Uncategorized

Sa të rrezikshme janë sulmet në internet?

Sa të rrezikshme janë sulmet në internet? Eshtë e zakonshme të mendosh se sa e rrezikshme është diçka qe mund te shkaktoj deme fizike. Një tornado është e rrezikshme sepse mund të shkatërrojë pronën. Një tigër është i rrezikshëm sepse mund të sulmojë një person. Po në lidhje me një sulm ku nuk preket asgjë…

Uncategorized

Rëndësia e sigurisë kibernetike për bizneset

Rëndësia e sigurisë kibernetike për bizneset Rëndësia e sigurisë kibernetike në biznes nuk duhet të anashkalohet kurrë, pasi nga viti në vit, sulmet në internet po rriten çdo dite e më shume në të gjithë globin. Sipas statistikave, sa më i madh të jetë biznesi, aq më shumë ka të ngjarë të pesoni nga një…

Uncategorized

3 REASONS WHY YOUR COMPANY SHOULD INVEST IN CYBER SECURITY

3 REASONS WHY YOUR COMPANY SHOULD INVEST IN CYBER SECURITY In a business world were digitization and customers’ privacy are key, safeguarding data has become a real must. Facebook, Ticketmaster, Adidas, Orange… the image of these companies was severely damaged after a security breach became public knowledge. Here are 3 key reasons that explain why…