Knowlegde

Cloud_security

Majority of firms concerned about public cloud security, most have suffered breach

/ Cloud Services
According to Sophos' State of Cloud Security 2020 study, 70% of public cloud enterprise users have experienced security vulnerabilities in the past year. Security vendor also pointed out that the Asia-Pacific region has the highest proportion of attacks. When everyone thinks that they are enjoying the cloud service of a ...
The Symptoms of Ransomware Infection

The Symptoms of Ransomware Infection

/ Cyber Security, Ransomware
The article lists the signs for being infected with ransomware, includes missing files, system boot-up delay, application or system crash, and received strange email messages, etc. These symptoms can assist Not-For-Profit Organizations earlier and easier to identify the ransomware attack. For details, please refer to the below link:  https://www.novabackup.com/blog/symptoms-of-ransomware-infection ...
Assessing the Security of Remote Access Services Guideline

Assessing the Security of Remote Access Services Guideline

/ RDP, Security Guideline, VPN, WFH
Remote access services enable workers of a company to access corporate IT services and their work files anytime, anywhere. When opting to use remote access services, a company must consider the security strength and weakness of different solutions, besides their user-friendliness and cost. Otherwise, its data assets will be at ...
Six Security Tips for Home Office

Six Security Tips for Home Office

/ Security Guideline, WFH
With the recent outbreak of novel coronavirus infection, many companies in Hong Kong have arranged their staff to work from home to reduce the risk of spreading the disease in the community. This arrangement presents a new challenge for both the companies and their employees. While advancements in mobile and ...
Beware of Attacks on Remote Access Services

Beware of Attacks on Remote Access Services

/ Cyber Security, RDP, VPN
Rush to Remote Access Services Opens More Opportunities for Hackers As the COVID-19 pandemic continues its spread globally, many organisations are implementing work from home arrangement, using a variety of remote access services to ensure employees can connect to the organisation’s internal network from home. Rushing to set up the ...
Beware of Juice Jacking when Charging Mobile Phones at Public Charging Stations

Beware of Juice Jacking when Charging Mobile Phones at Public Charging Stations

Many shopping malls, coffee shops and even public facilities nowadays are offering as part of enhanced customer services a complimentary charging station for their patrons to quickly recharge their mobile phones. However, users of such services may not realise that their phones could be subject to cyber attacks.   Known ...
10 measures to secure Zoom Meetings

10 measures to secure Zoom Meetings

/ Security Guideline, VTC, Zoom
Due to the global outbreak of COVID-19, many companies and education institutes have arranged staff and teachers to work or teach from home, resulting in more people using web meeting software for communication. With its ease of use and rich features, Zoom has been one of the popular software for ...
Why abandoned domain names are so dangerous

Why abandoned domain names are so dangerous

Abandoning the old domain name with will trigger information security issue. It is because attacker can re-register your domain name, set up an email server to receive your email or send email to your former customers.  Therefore, organization should have a good practice for domain management.   For details, please refer to the below link:   https://www.csoonline.com/article/3300164/dont-abandon-that-domain-name.html  ...
Several Well-known Organisations Being Targeted By Maze Ransomware Operators – Data Leak!!

Several Well-known Organisations Being Targeted By Maze Ransomware Operators – Data Leak!!

/ Cyber Security, Ransomware
Ransomware has evolved! Security researcher has found that ransomware not only encrypt files on the user's device and demand payment in order to decrypt the files, but also publish or sell it on dark web. Hong Kong Companies was also being targeted.   For details, please refer to the below link:   https://cybleinc.com/2020/06/01/several-well-known-organisations-being-targeted-by-maze-ransomware-operators-data-leak/  ...
What cyber security tools do small charities need?

What cyber security tools do small charities need?

/ Cyber Security, NGO
Small charities often lack the resources that can devote to cyber security, therefore they are potentially easy targets for cyber criminals. The below article provided some free or small cost security tools that can reduce the security risk. Such as tools to fight ransomware, to keep software up to date, to improve password security and to secure lost mobile ...