You’re pretty clued up when it comes to cybersecurity, right? You’ve got your anti-virus system in place, great passwords, and you’d never download a dodgy file or visit a strange website.
You’ve even aced your security awareness training and regularly conduct random phishing tests to see how well you can recognize risks. You don’t want to sound smug, but hackers aren’t pulling one over on you anytime soon.
That’s all great, but even that may not be enough.
Introducing NetCat. If you’re using an Intel CPU, your data is not as secure as you might think, even if no virus comes within ten kilometers of your computer. NetCat is a vulnerability that has recently been discovered in Intel CPUs. Hackers can exploit this vulnerability over a network and will then proceed to steal the data on your CPU.
Do I have your attention now? What the NetCat vulnerability shows us is that our systems are never really safe. You can never rely on a single method of protection so you need to create several layers. If you’re not sure where to start, you’re in luck – I’ve got a great infographic for you.
And then, why not look around your circle and see if anyone might be one of the most wanted cybercriminals on the planet. It’s likely that you’ll never know, even if it’s one of your closest friends. There aren’t necessarily any telltale signs to look for.
Or, maybe you’ve got a more prosaic motive for wanting to learn more about cybercrime. Maybe you have a business of your own that you’d like to protect. Learn more about the reality that small and medium enterprises face when it comes to the cyberworld.
Find out what might happen to your business if there is a breach. Will your business even survive? With only four out of ten small businesses surviving a breach, the odds aren’t in your favor.
But don’t despair, because you’ll find a ton of tips in the IG to help you shore up your security. Will you be told to use strong passwords, regularly update your antivirus software, and create backups? Yes, and a whole lot more besides.
The infographic also looks at some of the more enduring and dangerous myths in this space. It rounds off with a small section on GDPR. But why are you still reading this? Scroll down and check out the IG.