Page 2 of 3 FirstFirst 123 LastLast
Results 11 to 20 of 26

Thread: Cybersecurity attacks

  1. #11
    Junior Member
    Join Date
    Jul 2019
    Posts
    1
    Cybersecurity is the protection of internet-connected systems, including hardware, software, and data, from cyberattacks. In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems.cybersecurity is one of the parts of web page creation firewall.

  2. #12
    Junior Member Rajkotmachinetools's Avatar
    Join Date
    Jul 2019
    Posts
    1
    Cybersecurity is the trending topic for the IT world.

    **Links removed by Site Administrator so it doesn't look like you're spamming us. Please don't post them again.**

  3. #13
    Junior Member
    Join Date
    May 2019
    Posts
    13
    actually they are ways to avoid it. I agree with KarenGeorge.

  4. #14
    Junior Member
    Join Date
    Apr 2019
    Location
    Singapore
    Posts
    11
    Instead of trying out completely a new thing, it's better to give preference to monitoring software designed for the ease of organizations. Apart from preventing data breach, you can track your employee's activities to avoid any kind of inconvenience.

  5. #15
    Junior Member cykich's Avatar
    Join Date
    Dec 2019
    Posts
    6
    Boyofo,

    All devices that have an IP address should be secured with a lengthy, complex password.

    I am a security researcher. To keep hackers out and shore up your security efforts you'll need to train your staff to recognize sophisticated phishing attempts. Make sure that employees, guests and their personal devices can only access the guest account. Even the guest account should use a lengthy, complex password.

    Your IT staff should be constantly updating the software and firmware being used throughout the company. Firewalls and routers should be blocking certain website traffic. You may want to use VLANs to segregate / sandbox important resources from the rest of the network. Any remote accesses should be done using a VPN and be sure to disable ftp and telnet connectivity.

  6. #16
    Junior Member
    Join Date
    Sep 2020
    Posts
    1
    I recently came across a new open-source firewall named CrowdSec and decided to install it (it’s free). It can detect malicious behaviors, and protect your systems from pretty much all types of attacks. The technology is very easy to install and use. I had a chat with the guys behind it and they definitely know their stuff! They are aiming to build a reputation database which they will share with their user community while also using behavior and reputation features. Definitely worth a try!

  7. #17
    Junior Member kamarvatani's Avatar
    Join Date
    Nov 2020
    Posts
    1
    you need just a good security team

  8. #18
    Junior Member
    Join Date
    Feb 2021
    Posts
    1
    The best ways to reduce cyber attacks in the financial industry and IT industry is to implement GRC. where we can identify the risk and resolve it by governing the objectives and set up the compliance. we can make the organization safe and secure environment to work using GRC.

  9. #19
    Super Moderator rlirpa's Avatar
    Join Date
    Feb 2014
    Location
    MD, US
    Posts
    464
    Quote Originally Posted by feddyjason View Post
    ... GRC ...
    Wikipedia > GRC (Governance, Risk management, and Compliance)
    Rad

  10. #20
    Junior Member
    Join Date
    Oct 2021
    Posts
    15
    Even though cyber security is such a big issue in our current tech-oriented society, there is still not enough awareness as to how cyber attacks can be prevented.

Similar Threads

  1. Replies: 1
    Last Post: March 8th, 2004, 06:46 PM
  2. Preventing future attacks\Tracing attacks
    By Dimaggio in forum Newbie Security Questions
    Replies: 4
    Last Post: July 17th, 2003, 01:41 PM
  3. Cybersecurity law
    By paldie in forum AntiOnline's General Chit Chat
    Replies: 1
    Last Post: August 6th, 2002, 09:04 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •