Over the past decade, cyber security incidents which have caused devastating damages have largely been attributed to something called “supply-chain attacks”...
日期 : 2021年7月20日 机构 : 泰雷兹(Thales)集团 作者 : Mr. Welland Chu, Business Development Director, APAC 及 Mr. David Madden, Senior Business Development Director, Global
流动支付安全小贴士
作为一个普通消费者,在进行流动支付时可以做什么来保护自己呢?...
日期 : 2021年6月3日 机构 : 八达通卡有限公司 作者 : 陈展翔先生
勒索软件 - 2020年最大威胁 (只提供英文版本)
Ransomware continues to cause havoc at organisations of all sizes including enterprises, financial institutions and healthcare that are handling sensitive data...
日期 : 2021年1月19日 机构 : 香港电脑学会网络安全专家小组 作者 : Mr. Welland Chu, Business Development Director 及 Mr. Rana Gupta, VP of Sales, APAC
如何预防绕过双重认证的网络攻击 (只提供英文版本)
2-Factor Authentication (2FA) has been rolled out in many organizations as their baseline security and is one of the items in top of mind in many CISO...
Patch Management is nothing new for computer systems, but a challenge to execute effectively and efficiently. As more cyberattacks happen on endpoints, timely updates of security patches on computers are becoming even more crucial to protect systems...
日期 : 2018年11月16日 作者 : 网络安全精英嘉许计划2017金奖得奖者陈应强先生
流动保安的良好作业模式及小贴士(只提供英文版本)
In the global mobility and digital transformation landscape, under the MOBILE FIRST, MOBILE ONLY evolutions, it is no doubt that mobile would be the first selected by the end users experiencing the Internet application services...
日期 : 2018年9月24日 作者 : 网络安全精英嘉许计划2017金奖得奖者陈惠康先生
端点的多重防御措施(只提供英文版本)
Organizations should look for an endpoint security solution that can defeat ransomware and other threats regardless of how they attack the endpoints...
日期 : 2018年7月25日 作者 : 网络安全精英嘉许计划2017金奖得奖者罗少辉先生
预防仿冒诈骗的保安贴士(只提供英文版本)
Phishing scams are actually attempts to trick you into a social networking and fraudulent email message, telephone SMS test message, and instant message from mobile apps...
HTTPS is an encrypted HTTP connection, making it more secure. If you own or run a website, implementing HTTPS is important to protect the integrity of your website and to preserve the privacy and security of your users…
Cyber crime is on the rise and organizations are beginning to realize that being attacked is not a matter of if, but when. According to the State of Cybersecurity: Implications for 2015 study…
According to the 2015 (ISC)2 Global Information Security Workforce Study, 62 percent of nearly 14,000 respondents believe that their organizations have too few information security professionals…
Nowadays, Facebook has become one of the core social networking platforms for people to connect with each other. To prevent hackers from accessing your Facebook to see your secrets…
There are many Cloud Security standards in the world, but why they are matter to enterprises and small companies ? This article elaborates the standards in the market and the need of these...