Talent Development Centre

Tag Archives: cybersecurity

Attracting More Female Leaders into Cybersecurity

Cybersecurity is a growing field with an increasing demand for professionals in the field. In fact, in 2017, Cybersecurity Ventures predicted that there will 3.5 million cybersecurity job openings by 2021. Yet still, with such great need and opportunity, a study in the same year found that women only make up 11% of the total cybersecurity workforce.

It is clear that the entire IT industry needs more women, and cybersecurity especially is proving to have an even larger gap. What is stopping this demographic from entering the field? How did those already successful in it get there and what kind of advice do they give? This infographic by Varonis has the answers and more interesting statistics on the topic.

Attracting More Female Leaders into Cybersecurity

Jaw-Dropping Data Breach Stats for 2019

Data breaches are detrimental to a company. Setting aside the reputation damage that comes with them, the harm done to customers plus the impending legal battles that follow have cost millions and sometimes billions of dollars for organizations that were presumed to be secure. In today’s world where hacking is a sport with a lucrative pay-out, cybersecurity experts are in high demand.

Varonis recently sourced a list of 56 data breach statistics, including risks, costs and prevention tips. Along with the list came this infographic that highlights the most interesting and helpful stats. Have a look for some eye-opening facts that will make you think twice the next time you’re entering personal information into a field.

How Does Blockchain Work? (“simply” explained)

It’s nearly impossible to scroll through tech blogs or business articles these days without reading about some form of cryptocurrency or other technology secured by a Blockchain. Last week, we shared a video showing how hackers crack passwords and explaining some basic hash techniques that help protect passwords. That technology is child’s play compared to Blockchain technology.

Most of us can accept that Blockchains are one of the best ways to secure information today, but understanding how they work and what they do is a whole other story. If you do understand, then how are you at explaining it. Regardless, this video from Simply Explained is touted as the best video on YouTube for explaining how a Blockchain works.

How Does Password Encryption Work?

If you’re an IT security expert, or any technology professional for that matter, you already have a decent idea of how passwords are saved. You’re well aware that they do not get saved in plain text form and that encryptions (try to) protect passwords from being hacked. You also probably know their vulnerabilities. Have you ever tried explaining all of that to a non-technical friend who still insists on using 123456 as their go-to password?

This video from Tech Raj puts everything on the table. It clarifies the technology of passwords and gives examples of how hackers typically get through them, including rainbow tables, dictionary attacks, and brute force attacks. If you’ve been wanting to explain the basics behind password hacking but are having trouble getting into words, then feel free to share this video.

Protect Yourself Online with These Tips from a Former Hacker

Monday’s infographic explaining the elements of a data security policy is helpful for organizations and those advising companies on best practices for their data. But individuals also need to think about cybersecurity and protect themselves from hackers. And what better way to defend against a hacker than to learn from one?

In this video from Tech Insider, a former NSA hacker explains some of his past tricks and shares some tips to protect yourself online. Some of these may be common sense, but in other situations, you may be creeped out by what these technology geniuses can accomplish.

9 Key Elements of a Data Security Policy

There’s nothing more invigorating than policy, right?! It’s not always an exciting subject but if you’re an IT Security professional, then you know the right data security policy is crucial to maintain an organization’s integrity. If you’re not in the IT security field but responsible for your organization’s data, then it may be an overwhelming topic.

Insurance companies hold a lot of personal data and a single breach can be detrimental for their reputation and, more importantly, their clients. So, when insurance company Travelers put together this infographic explaining their key elements of a data security policy, we thought it worthy to share, especially for those unfamiliar with the topic. Is there anything you would add or remove?data security policy infographic

Quick Poll Results: Do IT Professionals Follow IT Security Best-Practices

It should be a fair assumption that the more knowledge we have about threats, the more cautious we will be. For example, a hiker who is educated about dangerous animals, poisonous plants and harmful bugs is going to proceed down a nature trail much more carefully than the casual jogger who knows little about the forest. By that same thinking, an IT professional who understands security threats should be more cautious when navigating the Internet, right?

Last month’s contractor quick poll set-out to prove that theory. We asked IT contractors which password mistakes they made recently. As expected, everybody takes the odd shortcut, but surprisingly, 80% of respondents said they use the same password in multiple places and don’t change their passwords frequently. Are you shocked with these results or are they what you would expect?

Quick Poll Results: What password mistakes have you made recently?

Contractor Quick Poll: Do You Make These Password Mistakes?

It never ends! It seems every time we turn on the news we hear about an organization who had their data hacked in one way or another. On a personal level, how many times have you received notes from people on Facebook or through email warning you not to click their links because they were hacked?

There are a number of ways your account may be hacked, but experts frequently tell us that the easiest way to avoid a hack is to follow best practices when setting passwords and avoid falling into slumps. In this month’s Contractor Quick Poll, we’re asking our audience — knowledgeable IT professionals — how many password mistakes they make.

How Hackers Get Around Two-Factor Authentication

Two factor authentication is an extra security measure a lot of people have begun to use to further protect their accounts and personal information from being hacked. This authentication method sends a text to your phone with a code that must be inputted within a minute to log in.

However according to Tech Insider’s interview with Kevin Mitnick, hackers have ways to even bypass this. An example he uses is when Black Lives Matter activist DeRay McKesson had his twitter hacked. While there’s no need for constant paranoia, this video suggests tips to stay aware of the common tricks hackers use.

Should You Cover Your Webcam?

A lot of people use sticky notes to cover their webcams, but is this really necessary? A video by The Verge explores how there are in fact occasions where hackers can gain access to your webcam and even your microphone. And it’s not just your laptops anymore, mobile phones and devices like smart home speakers can be hacked too. So while it’s unlikely we will go and cover all our devices, maybe starting with your webcam is a good thing.

Watch the video and find out more about what Tod Beardsley, the research director of Rapid Seven, a cybersecurity and penetration testing company had to say about your cyber safety.