In the news

Posted in Uncategorised

Coaching leadership


FUTURE PROOF - Are passwords enough?


February 2020 ASIS News

  


The ASIS Jamaica Chapter meeting of Feb 20, 2020 had Professor Clayton as our guest speaker.

His address was covered by one of our leading daily newspapers.

More... 


Cyber criminals exploit pandemic to carry out attacks


Letter Of The Day | COVID-19 Has Brought Security Threats To The Fore

 

Published:Thursday | June 18, 2020 | 12:17 AM

THE EDITOR, Madam:

Businesses, institutions, corporations and individuals are now relying more heavily on Internet usage. With the increase in online activity, there is the risk of propriety information being compromised by hackers who will be actively phishing, sending malware to gain entry to protected information. Those mostly targeted are credit and debit card transactions, and identity theft.

Online banking transactions have increased due to the lockdown brought on by COVID-19, e.g., bill payment, transfers and remittance to accounts, and account balances are checked more frequently. This repeated online use makes users more vulnerable; now is a good time to change passwords and PIN numbers, and different passwords should be used for different platforms. A strong password is a combination of alphanumeric and symbols involving upper- and lower-case letters. Companies/institutions should seek the services of an ethical hacker to thoroughly check their IT platform in order to evaluate its security. Remember that there may be backdoors or other faults in the design that your IT specialists are unaware of.

Apart from a fire, the worst thing that can happen to a company is to lose proprietary information; for example, trade secrets and customer database. The consequence of this can lead to loss of business, loss of core business processes, loss of competitive advantage, and reputation damage.

A virtual threat is another tool that is used to embed a malware in a server or computer system. A program is surreptitiously installed on the network through a target computer. This control program will give commands to the devices on the network and, ultimately, the program controller is now monitoring your network. All of this would be unknown to the owner of the device or network users.

CARLOS PIPHER

Security Professional