The Amsterdam hospital OLVG has been fined 440,000 euros by the Dutch Data Protection Authority. According to the Dutch Authority, the hospital had taken too few measures between 2018 and 2020 to prevent access by unauthorized employees to medical files. There was not enough control over who viewed which file. The security of the computer […]
The Cyber Security Council is a national and independent advisory body to the cabinet. They are concerned about the growing dependence on the Netherlands when it comes to the use of new technological applications or services from foreign tech companies. This can lead to potential vendor lock-in and in exceptional cases possible access to data […]
Awareness training in the field of cybersecurity and phishing must be repeated after approximately six months to ensure that employees continue to recognize phishing emails properly. This is evident from a study that was carried out by a number of German universities at an organization from the public sector. In Germany, public organizations are required […]
CISA and FBI are actively reporting vulnerabilities in F5, Pulse Secure, Citrix, BIG-IP and Exchange
Groups of attackers are actively exploiting known vulnerabilities in F5, Pulse Secure, Citrix, Exchange and BIG-IP to attack organizations, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) of the US Department of Homeland Security said in warnings. It would be groups operating from Iran and China. The group actively searches the Internet for […]
NCSC learns from every incident and that is brings advice to reduce the chance that organizations will become infected with ransomware and malware and limit the spread of malware within the organization and the impact of the infection. it is important to emphasize two extra measures, namely having tested, up-to-date, offline backups and disabling or […]
According to researchers at the American Ponemon Institute, cyber attacks are the leading cause of data leaks, followed by technical defects, configuration errors in the cloud and human error. The “Cost of a Data Breach Report 2020” study conducted by IBM among 3,200 people from 524 organizations shows that the average cost per leaked or […]
NCSC published the following Small Business Guide for Cyber Security with the following steps for which ID Control gives some free trials of cloud security services: Backing up your data; Protecting your organization from malware (f.e. https://antivirusservice.eu/ ); Keep your mobile devices safe (f.e. https://antivirusservice.eu/ ); Using password to keep your data safe (f.e. https://idcontrol.pw); Avoid phishing attacks. […]
The FBI has provided Internet users with tips for recognizing malicious web stores. According to the U.S. Service, there is an increase in the number of victims being tracked down through fake online stores. The US regulator FTC also reports an increase in the number of shoppers who do not receive ordered goods. These include […]
Twitter Hack Zoom court hearing was interrupted by a Porn Video as the meeting was Zoombombed. “Zoombombing” is when an uninvited person joins a Zoom meeting. This is usually done in an attempt to gain a few cheap laughs at the expense of the participants. Zoombombers often hurl racial slurs or profanity, or share pornography […]
Safe working from home not under control? Then follow the following 8 recommendations to work from home safely: Set up two-factor authentication for administrators. Set up two-factor authentication for regular users. Avoid using administration rights with normal users. Record what users do within your environment. Set ‘alerts’ to receive notifications about strange activities. Know the […]