Responding to incidents of sexting and safeguarding young people

There are currently huge challenges for police, schools, parents and social care in managing incidents of sexting. Recent data from the NCA CEOP found that of 265 schools in their network surveyed 60% of them had had an incident in the last year which totalled 960 instances, 52% had dealt with 1-4 incidents and 24% had dealt with 10...

Switzerland: a country where Data Protection rules become a (paying) real asset for individuals

Following – and even enhancing – European Union’s GDPR framework, Switzerland adapted and buffed up its Federal Law on Data Protection. In most of the European countries, compliance to the GDPR is seen with worry by companies which handle personal data, as the fines in case of data breach will be up to 4% of their yearly incomes. But...

Cybersecurity: Workforce shortage or lack of HR profiling knowledge in recruitment?

One of the most current topics in the (cyber) security community discussions lately is the workforce shortage in the field. Since it is obvious that is a real problem to find an appropriate security team for almost all businesses, there are still a lot of things to be clarified in order to have a common understanding on this issue. First,...

Cyber Authentication: rules for a quick and secure authentication

“It is not true we have little time: the truth is that we lose of it” - De Brevitate Vitae,    Lucius Anneus Seneca.   Time never seems to be enough, and if from one side technological evolution sped access to some services, from the other one it had to deal with security problems and dangers. For this reason, we passed from...

7 Awesome Skills That Will Make You Stand Out As A CyberSecurity Pro

Are you an IT Graduate or Network Security Engineer looking to enhance your career and stand out from the crowd? This article is for you.   I have been in the network & security space for more than a decade. As a network security engineer, security consultant, and now Founder & C TO at iCyber-Security Group, these products have served me...

Anti-ransomware protection recommendations

In recent years, users and organizations of all kinds are facing a computer threat known as “ransomware,” which is nothing more than a malware whose purpose is to prevent victims from accessing files or even the entire infected computer system, until the payment of a certain amount as redemption(“ransom”).   Thus, the ransomware has become one of the most troublesome forms...

The importance of collaboration in cyber defence

2017 has seen continued evolution in the number of attacks, its deviant forms and the success such attacks are having in extracting funds from private individuals, companies and even public bodies. By the end of the first half of 2017, there had already been at least 1.9 billion data records stolen that are known about, from 918 cyber attacks.   The...