Categories
2022 News-EN

WHY CYBER SECURITY IS ONE OF THE BEST INVESTMENTS IN YOUR FUTURE

news

WHY CYBER SECURITY IS ONE OF THE BEST INVESTMENTS IN YOUR FUTURE

Recently I was so lucky to have the opportunity to speak at the third edition of “99eLode“, a training organized by Fastweb Digital Academy, Cariplo Factory and iO Donna, the weekly magazine of Corriere della Sera.

Designed for 99 recent graduates waiting to understand what to do with their future, the purpose of the training was to provide information about the most requested digital skills on the market.

Among these, Cyber Security, which I described with Women For Security colleagues, taking into consideration not only the technical, but also the legal, marketing and communication aspects.

So, why is Cyber Security one of the best investments for your future?

Here are 3 good reasons.

  1. Fighting cybercrime will always be a priority

    Cybercrime caused $6 trillion of damages in 2021, the double of the amount of six years earlier.

    And it’s expected that in the next 3 years the cost for Cybercrime will exceed $10, with an exponential trend.

    Moreover, for some years now, the profits of cybercrime have exceeded those of the drug market, so that several criminal organizations are deciding to invest in this sector.

    The overall effect is that cyber defenses will face ever more numerous and aggressive enemies.

    Cyber Security will become and will remain a priority to protect individuals, organizations and also nations.


  2. There is a great shortage of jobs in the Cyber Security field

    From 2013 to 2021 we have seen a growth of 350% in Cyber Security jobs, a trend never seen before.

    There are currently 3.5 million cybersecurity job vacancies globally, 400,000 in Europe alone.

    In 2014, vacancies globally were “only” 1 million.

    Basically, there is no unemployment for those who decide to work in the Cyber Security sector (and it has been like that since 2011!)


  3. Not only Cyber Security “technicians” are needed

    Certainly, the technical jobs of Cyber Security are important.

    Penetration Testers, Malware Analyst, Vulnerability Researchers and many others are key roles in this industry.

    But they are not the only needed functions.

    Important roles equally must be able to manage the legal issues, privacy, regulatory compliance, the governance of cyber security.

    As well as project management, marketing, communication, pre and post-sales aspects, training, etc…
Cyber Security, ultimately, does not only concern those with technical skills but those who are able to commit themselves with their specific skills and abilities to protect companies, organizations and institutions from the threats and risks of the cyber world in constant increase.

Good job!

Latest news

HACKS OF TODAY 23/04/2024

Today's HOT includes 12 ransomware victims by the notorious Medusa, Abyss, RansomHouse, Cactus, RansomHub, BianLian, Qilin and Qiulong gangs. The average Cyber Risk Factor is  4.5. Read below...

Read More

HACKS OF TODAY 20-21-22/04/2024

Today's HOT includes 10 ransomware victims by the notorious 8Base, Medusa, Embargo and Inc Ransom gangs. The average Cyber Risk Factor is  3.9. Read below the full list.

Read More

HACKS OF TODAY 13-14-15/04/2024

Today's HOT includes 24 ransomware victims by the notorious Hunters International, LockBit 3.0, Daixin, Medusa, ThreeAM, Black Suit, DragonForce, 8Base, Akira and DarkVault gangs. The average Cyber...

Read More
Categories
2022 News-EN

FIVE RULES FOR BEING SAFER ON INTERNET

news

FIVE RULES FOR BEING SAFER ON INTERNET

Safer Internet Day (SID) is celebrated on February 8th, an initiative created by the European Commission to promote safer and more responsible use of technology.

Celebrated in 200 countries around the world since 2004, Safer Internet Day invites us to provide a safer digital environment, especially for young people.

Internet world offers enormous opportunities, possibilities for learning and for acquiring new knowledge, but it also carries several risks.

Thanks to initiatives such as SID it is possible to raise awareness of risks and threats, but at the same time take to carry on concrete actions in order to protect users.

So, let’s see 5 rules to be safer on the Internet.

1) Systems and applications:
Update systems and applications you use and keep them constantly updated.
This rule applies to both PCs and mobile devices (smartphones, tablets, etc.).
Download and install applications only from official websites or app stores and be suspicious of unofficial stores: the risk it to install malware.

2) Account and identity:
Protect your accounts with a strong and enough complex password (over 8 characters, with upper and lower case, numbers and special characters).
Do not use the same password for all accounts, especially for emails and logins to important applications.
Use a password manager to remember all the passwords and protect the access with a master password (the only one you’ll need to remember by heart!)

3) Email and SMS:
Be wary of suspicious emails and SMS, from senders you don’t know or who refer to transactions and activities that don’t concern you.
Do not fall into the trap of Phishing and avoid clicking on suspicious links or opening attachments that could be harmful.

4) Antivirus and antimalware:
Install antivirus and antimalware on the devices you use.
Again, this rule applies to PCs but also to mobile devices (smartphones, tablets, etc.).
Install the antivirus on all devices you use to browse the Internet and keep it up to date.

5) Caution and security
Beware of websites where you can download free software and content: the risk of running into malware is very high.
Do not share credentials, passwords or login information with anyone.
Do not leave PCs and smartphones unattended.

Happy Safe Internet!

Latest news

HACKS OF TODAY 23/04/2024

Today's HOT includes 12 ransomware victims by the notorious Medusa, Abyss, RansomHouse, Cactus, RansomHub, BianLian, Qilin and Qiulong gangs. The average Cyber Risk Factor is  4.5. Read below...

Read More

HACKS OF TODAY 20-21-22/04/2024

Today's HOT includes 10 ransomware victims by the notorious 8Base, Medusa, Embargo and Inc Ransom gangs. The average Cyber Risk Factor is  3.9. Read below the full list.

Read More

HACKS OF TODAY 13-14-15/04/2024

Today's HOT includes 24 ransomware victims by the notorious Hunters International, LockBit 3.0, Daixin, Medusa, ThreeAM, Black Suit, DragonForce, 8Base, Akira and DarkVault gangs. The average Cyber...

Read More
Categories
2022 News-EN

HOW AN ASSESSMENT OF IT SYSTEMS CAN PROTECT YOUR BUSINESS

news

HOW AN ASSESSMENT OF IT SYSTEMS CAN PROTECT YOUR BUSINESS

After having seen which assessments should be performed periodically on IT systems to identify the problems exploited by cyber criminals, let’s see instead how one of these checks allowed a company to save itself from a series of threats it did not know.

Our customer, with over 100 locations and stores around the world, had reports on their systems vulnerabilities.

In a company of this size, however, there are countless systems that could be affected by problems, not only servers, but also employees’ PCs, mobile devices, network devices, printers, etc.

It is not easy, therefore, in the presence of such a complex and constantly evolving architecture, to be able to highlight the critical issues.

Our task every year was to carefully analyze the last report, identify the most serious vulnerabilities and, subsequently, carry out a Penetration Test on these, or a verification of how they could have been actively exploited by a cyber criminal to violate the company’s systems.

We also added some extra assessments such as verifying the company’s Social profiles, a phishing or Social Engineering test.

Certainly, a complex and ambitious project, carried out regularly starting 10 years ago, when such activities were not widespread at all, but which allowed the company to avoid various problems, to implement new countermeasures and to verify thir improvements over time.

So much work, but also great satisfaction.

For example, when we checked Social profiles, we came across a fake customer care from the company offering customer support.

The criminals intercepted the comments of customers who needed support directly from the official company page, then diverted them to a fake profile.

In addition to the damage to customers, the situation presented clear risks to the brand’s online reputation.

Our prompt identification of the problem has certainly averted the worst scenario.

On another occasion, we identified instead a malicious websites that, using domains similar to our customer’s one, were selling counterfeit products.

With a thorough research we were able to find several sites of this type, one of which, of Chinese origin, was selling fake products from the new collection.

The customer had developed the design months before, but the collection, intended for sale only later, had not yet completed the production phase.

The Chinese fake site, on the other hand, was already selling the products well in advance, a clear indicator that the company’s servers had been hacked to steal the collection design.

Thanks to our business, the customer has therefore obtained two advantages.

  • First, he was able to file a complaint with the relevant authorities, making sure that the malicious site was closed.
  • It also carried out a thorough investigation of its systems to assess how and when the attack occurred.

With this information it was possible to reassess the company’s cyber defenses, updating them in light of the violation suffered.

Ultimately, systems assessments allow companies to uncover issues that could be exploited maliciously.

But it is also often possible to identify indicators of cyber attacks that have already occurred, mitigating their effects and preventing further damage.

Definitely a major benefit!

Latest news

HACKS OF TODAY 23/04/2024

Today's HOT includes 12 ransomware victims by the notorious Medusa, Abyss, RansomHouse, Cactus, RansomHub, BianLian, Qilin and Qiulong gangs. The average Cyber Risk Factor is  4.5. Read below...

Read More

HACKS OF TODAY 20-21-22/04/2024

Today's HOT includes 10 ransomware victims by the notorious 8Base, Medusa, Embargo and Inc Ransom gangs. The average Cyber Risk Factor is  3.9. Read below the full list.

Read More

HACKS OF TODAY 13-14-15/04/2024

Today's HOT includes 24 ransomware victims by the notorious Hunters International, LockBit 3.0, Daixin, Medusa, ThreeAM, Black Suit, DragonForce, 8Base, Akira and DarkVault gangs. The average Cyber...

Read More
				
					-----BEGIN PGP PUBLIC KEY BLOCK----- xsFNBFyONI0BEAC3wJRo5qhtr1KsqVdMz7b5JqHmt7H0ZZr14oJ9TV/hD9LMfrKpnQ94dFGnpfGa BKC1wSoJN4Yfs5lg5YmN4hmHmm6PkjgQdenVgL4YDfLDodwn5DgXKuywRBqIFbbnTDvFAb03DX2A FPnc+4g2QHsfiFycz+ISg/Z+8i21gY3j5oZlrdMKVWrNczrNc/lDJqJ36RSYDn1QzAW1ZGY/pUXk imPRvLew5Idr3462sZVVhuUFMD3Uf/W1SaS3bSEQM89pSYKZfo8AFpAs659Mn7gqKru6ndxilRdF wJGQuepqR8kz+vVPLyxJj68ii2ZBIY50RQvSBgJRnNF/Htp30cuk3v8jfSGZit9XYTTGQThVbfGR ZcKWze/iF+es110+mNXA/8s7jKs95PI+z1Foc9o74Ujs8dvjEGHTaESIEzX3JtEZUCZUiPt/P8pU Jw0ewbj1XCacYxYVsR7ODlf6GEsjt868WcjiqsuuZo2rzO4og9hFU5DlBzuePklfhw8dO5CiMN2H vtSkAn4DkgHqC+JiciHc9h5Cvvfjp52oQPj1eYmU3LkOvGFmPXVIts3VfxsQT3gk+DmrQ4J//fAl tNRSbMBnGu5F/qnLLkJmKRKPKNNcpjptFznKxLZbxW5QbAeDok3ho8YQACfADKcrmaIRkoPr8/mn PxZgMSMB87W7sQARAQABzSRTb2ZpYSBTY296emFyaSA8c29maWFAaGFja21hbmFjLmNvbT7CwZQE EwEIAD4WIQTNwEbcXbH0vegGlHCd6fr0nsTifwUCXI40jQIbIwUJEswDAAULCQgHAgYVCgkICwIE FgIDAQIeAQIXgAAKCRCd6fr0nsTifwKuD/4+3MaN+9eFiltI06fFBjr1Csh0OLFw89jFnpuYl9Sm ImVqmBwrnm+APxxLK4M+FMuNm4fW08X249t09Nsf0ba6UJ0HR/7/fRTipjzRLqHSr0+ZjVUGHhon fuuFZgNzPA5RmQZZCyiwyqZJs7pLn1QI/CtlDP6MsQhadywbkO/5LlDoBoYh/2DYNA/mtEfJbvc/ cOvfk47thj5OzcXJEWFxz7h2P5C2ELwxdhNPC+uqcOQkTScnuIBJooheJPhdmqOtOwrbUUIfaryM IESrol3Jg3/MUOe7FLXhwCSQGY1iefzl4py2jTeK936GMBHifLSUCA88lpE7ALkbf3+qJ9ABra9G e9e0dirIlPvFgBkEBBXsoIReQLrhHKFBtvKdrrE9Rb7kAwon+sW+3Uf6Ie3M8nTisGy2AmlI/tQ5 V0MHU2UJUNcc59hk7ADIlXN64eeqELgsMtlR4wEHd6nwcEpoPCTWfrVSwzsPtXUGNAGbgGxISv/F ltcFJ6Qw6Zy4f+YBEyCx/7GA3kjLllkcHv4kwHpP+WQCzbjh2JdkGEp5AY7puil1AtOFcbirbHbR 83KVeqx4Vvlyh2jhIDQYB/9qpTDC1xDKpndn40gnNd5hvjK0I0Xvbhb0PLhCpJQ5tsvPiQHjhOMF Wye3ZigaX1gTZxE29MLtwBbOYdGCYG0MrM7BTQRcjjSNARAAupAKTZXLRktriUVqhkZpU8zUVwrW ik6siStg7BppSJuKVW+Ic8QIagW0I48d2jZIIXrQRvqVBixn8eeBTE8Cujum1mZyhTw2sri3gE9i 81gisF17T/uewzRyYwx8obMfSEBnwJa44td7VjtbfLMRtfneK9R40+kELhhvXZa3DBbcG86zHVPU f1YkLX4RNSyjz4vOCX3WlcIAOr6MJA8DT+F5mUCVEhnkeUbflXtxRSeTUTfOw/3MYLs+mc6hWwLq gqTMcIQhDrYEY5wUgb5Mj86NR/uvsThL6MtWCJWVbfxHxM575woyTdD9E6HGO6loHYdky/7I+XFZ twgxsGn6HJYT+Gwn9BI5/DiwT1Qb/AyADktN1jGmZGTlniS+hly7rm0EHb2CTTM5zT1fh/sCOtQb nYIUf2in2cIfcFvzeFrUbDk2HfJMp5FmY6tBEV5xyNCww/mBkW2nuZy9CvAheJEOGoO8lyonPU2u ARq345LdbS6l+VdivPmZoLNpIMRw9MSTYmzm08h7C+/6hxzpjw1/nWZ+W2k9VpLutEs7KMtsbZR4 WhVFVS1uhqxrnjoeBHznh360Ou8SR+PFO0HIrYz4W7ayfcBhqcsGrM9u1E892gjUVTbPv8UoXQ8S Zm9ra2jqbfZGbyOpMIlyMzHTak7r0IZvCedEUDCimitbw98AEQEAAcLBfAQYAQgAJhYhBM3ARtxd sfS96AaUcJ3p+vSexOJ/BQJcjjSNAhsMBQkSzAMAAAoJEJ3p+vSexOJ/C+wP/iGvKG1NldCT2gR7 oWhmvgBnsD7qjC57RX0Go7WD1lmrWP4xWpvM6Tj0V4ZsXnyB8zUR38p49PPymjwy51FAss5PYh8S bVC1/sKC5Sae3kiAoMGH29MBAwL1IkJ8PNw6uOJHhUIJgKT5RWk2f7q3+Tha19slXwD/FC1IcBJK baxyVkG3cG5AnNvvKZyFAUNZ9FiBycaNHO4o6bCcCzSsaRLL2azudJLrF8UYPfTNBQ6Cr4QLqaRb t+ZqL2nqmcadO1AtxLtq5lQjxbhJ3jSYIcQJRq0ztbIBcPrdR2B/dfVED9cU5leSmNXxrh09gJ7N tmUpVo5fBcbf6fP7h2HIFBpH+G/8UUlcbm9pQ5Jcb8FEom0JrfaIAuv1gEIJAk1mkqLNzWUs8KuL nCBBVT2+2hfEZjtjUYbCLVB4LRCsLs9CY1wS3yKca90S8m0tfKcSj3K3k8qlKodkE2raX2GW2dm9 b200ENbb41B1uZlPts4Yh/AMfLqoNv8wyw0GlUQ2DqgDqviLANYbg4/GHwTLwO2b9UMHuTVU3woS 1LRKt0iPPsd+ir+9YRAVt5LB5XTS5C5cdIW9JSXQ+0cnbr3LPZCBulOew/M72liBINKWKGoUyueF 73ckNO9S7pzTOCpjn3+gAuzN/itwgwrMLoqUqqBuxzd7cKNJHTFdTIfTm53f =KIMs -----END PGP PUBLIC KEY BLOCK-----