Offensive AI: How you can optimize your Cybersecurity investment to prevent and detect attacks with AI technologies
After a few decades of rapid growth of Artificial Intelligence (AI) since 1950, AI has a greater and broader relevance to human lives...
Date : 31-March-2022 Organisation : Deloitte Advisory (Hong Kong) Limited Writer : Ms. Eva KWOK, Mr. Terence LI and Ms. Vanessa MAK
Secure Use of QR Code
In this blog, we would discuss the applications and risks in four major areas: mobile payment, website redirection, authentication and information storage...
Date : 18-January-2022 Organisation : Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) Writer : Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT)
Protect sensitive information in the use of social media and beware of potential cyber attacks arising from data leakages
The security issue of placing personal information on social media platforms heightened once again after reports of serious data leakages at three of the world’s biggest operators in early April 2021...
Date : 18-January-2022 Organisation : Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) Writer : Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT)
Common security issues of SMEs and non-profit making organisation websites (Chinese Version Only)
與網站相關的攻擊近年不斷上升,黑客透過尋找網站系統的漏洞發動攻擊...
Date : 2-August-2021 Organisation : Cybersecurity Centre of the Hong Kong Institute of Vocational Education (IVE) Writer : Mr. NG Kong Sum, Kinsey
Supply-chain attacks and protecting the “Chain of Trust”
Over the past decade, cyber security incidents which have caused devastating damages have largely been attributed to something called “supply-chain attacks”...
Date : 20-July-2021 Organisation : Thales Group Writer : Mr. Welland Chu, Business Development Director, APAC and Mr. David Madden, Senior Business Development Director, Global
Mobile Payment Security Tips
What can a consumer do to protect oneself when making mobile payment?...
Date : 3-June-2021 Organisation : Octopus Cards Limited Writer : Mr Alan CHAN
Ransomware - Top Threat of 2020: How it has evolved and how one should prepare against its attack
Ransomware continues to cause havoc at organisations of all sizes including enterprises, financial institutions and healthcare that are handling sensitive data...
Date : 19-January-2021 Organisation : Thales Group Writer : Mr. Welland Chu, Business Development Director and Mr. Rana Gupta, VP of Sales, APAC
Attacker is now able to bypass 2FA – how to prevent
2-Factor Authentication (2FA) has been rolled out in many organizations as their baseline security and is one of the items in top of mind in many CISO...
Date : 20-December-2019 Organisation : The Hong Kong Computer Society Cyber Security Specialist Group Writer : Mr. Nelson YUEN, member of Executive Committee
Password Choices (Chinese Version Only)
每個人都有「不能說的密碼」,無論是網上銀行、購物還是社交媒體平台,現代人的生活與密碼不可分離...
Date : 29-March-2019 Organisation : Lapcom Limited Writer : Mr. Eric KWOK, General Manager
Winning The Game Against Cyber Criminals
Employees are fast becoming the weakest link in the defence against cybercriminals. Sometimes common sense can only go so far, as you need to make sure that best practices around security don’t go in one ear and out the other...
Date : 31-December-2018 Organisation : Asia Pacific at Palo Alto Networks Writer : Sean Duca, Vice President and Chief Security Officer
Pay Attention to the Safety of IoT (Chinese Version Only)
Date : 30-November-2018 Writer : Ms. Billie KWOK, Gold Winner of Cyber Security Professionals Awards 2017
Timely Patching
Patch Management is nothing new for computer systems, but a challenge to execute effectively and efficiently. As more cyberattacks happen on endpoints, timely updates of security patches on computers are becoming even more crucial to protect systems...
Date : 16-November-2018 Writer : Mr. Laurence CHAN, Gold Winner of Cyber Security Professionals Awards 2017
Best Practices & Tips for Mobile Security
In the global mobility and digital transformation landscape, under the MOBILE FIRST, MOBILE ONLY evolutions, it is no doubt that mobile would be the first selected by the end users experiencing the Internet application services...
Date : 24-September-2018 Writer : Mr. Chan Wai-hong, Gold Winner of Cyber Security Professionals Awards 2017
Multilayered Defense for Endpoint
Organizations should look for an endpoint security solution that can defeat ransomware and other threats regardless of how they attack the endpoints...
Date : 25-July-2018 Writer : Mr. Victor Law, Gold Winner of Cyber Security Professionals Awards 2017
Tips on Protection against Phishing Scam
Phishing scams are actually attempts to trick you into a social networking and fraudulent email message, telephone SMS test message, and instant message from mobile apps...
Date : 1-June-2018 Writer : Mr. Frankie Leung, Gold Winner of Cyber Security Professionals Awards 2017
Safeguarding your Domain Name with Domain Name System Security Extensions (DNSSEC)
According to statistics disclosed by the Hong Kong Computer Emergency Response Team Coordination Centre, the number of security incident reports increased by over 23% to 6,058 reported cases in 2016 compared with 2015...
Date : 26-September-2017 Organisation : Hong Kong Internet Registration Corporation Limited (HKIRC) Writer : Mr Leo Lam, Chief Executive Officer of HKIRC
Lessons Learnt from WannaCry (2): Integrated Automation of Cyber Security Measures to Mitigate the Threat of Industrialisation of Hacking (Chinese Version Only)
WannaCry事件肆虐全球,令業界更關注網絡保安問題,亦說明黑客活動已變得工業化...
Date : 19-July-2017 Organisation : Cisco Systems, Inc. Writer : Mr. Garrick Ng, Chief Technology Officer, Cisco Hong Kong, Macau and Taiwan
Lessons Learnt from WannaCry (1): Cyber Security is not Simply Employing Firewall? (Chinese Version Only)
Date : 5-May-2017 Organisation : Hong Kong Information Technology Federation (HKITF) Writer : Eric Fan
Moving More of the Web to HTTPS
HTTPS is an encrypted HTTP connection, making it more secure. If you own or run a website, implementing HTTPS is important to protect the integrity of your website and to preserve the privacy and security of your users…
Date : 3-March-2017 Organisation : Google Chrome Writer : Parisa Tabriz
Precious Photos Encrypted by an Email? (Chinese Version Only)
Date : 20-April-2016 Organisation : Professional Information Security Association (PISA) Writer : Eric Fan
The State of Cybersecurity: From Threats to Opportunities
Cyber crime is on the rise and organizations are beginning to realize that being attacked is not a matter of if, but when. According to the State of Cybersecurity: Implications for 2015 study…
Date : 15-January-2016 Organisation : ISACA China Hong Kong Chapter Writer : ISACA China Hong Kong Chapter
8 Security Essentials for Managing Business Operations
According to the 2015 (ISC)2 Global Information Security Workforce Study, 62 percent of nearly 14,000 respondents believe that their organizations have too few information security professionals…
Date : 7-September-2015 Organisation : (ISC)2 Writer : Chuan-Wei Hoo
Security Issues of Hong Kong Home Routers
Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) analyzed home router security issues in Hong Kong using the Shodan Internet services search engine and found that a large number of home routers can be discovered by scanning…
Date : 30-July-2015 Organisation : Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) Writer : Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT)
Safeguarding Your Domain Name
Rising cyber security threats have been posing challenges to not just corporation websites, but also their brands and trademarks. Visitors to the affected sites were redirected to fraudulent websites, which caused substantial loss in…
Date : 25-June-2015 Organisation : Hong Kong Internet Registration Corporation Limited (HKIRC) Writer : Jonathan Shea
Tips on Securing Your Facebook Account
Nowadays, Facebook has become one of the core social networking platforms for people to connect with each other. To prevent hackers from accessing your Facebook to see your secrets…
Date : 17-April-2015 Organisation : Hong Kong Polytechnic University Writer : IT Security Team, ITS Office
Date : 30-December-2014 Organisation : (ISC)² Writer : (ISC)² Safe and Secure Online
Cloud Security Standards for the Rest of Us
There are many Cloud Security standards in the world, but why they are matter to enterprises and small companies ? This article elaborates the standards in the market and the need of these...
Date : 30-December-2014 Organisation : Cloud Security Alliance Writer : Michael Yung