Blog

Cybersecurity Predictions for 2020

Sharon Holland

The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before.  Each year we are seeing more and more challenges in the fight against cybercrime.  With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.

more →

Blog

Top 6 Risks to the Enterprise from The Internet of Things (IoT)

Sharon Holland

IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network.  The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025.  Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.

more →

Blog

IoT & DDoS Part 1: Nobody Knows You’re A Hacked Light Bulb

Neil Gershenfeld, the MIT computer pioneer, once made the joke that “On the Internet, nobody knows you’re a lightbulb”.1 2 Speaking back in 2005, he was referring to the then emerging technology platform of the Internet of Things (IoT), where all sorts of devices and sensors such as webcams, lights, thermostats and even coffee pots were starting to be IP-enabled and connected to the Internet.

more →