Cyber Security Predictions for 2023

Cybersecurity isn’t easy. Over the past few months, organisations including Uber, Cisco, Twilio and Rockstar Games have all fallen victim to data breaches as a result of cyber attacks. Recently, some of Deloitte’s leading analysts shared their top strategic cybersecurity predictions for 2023. Deloitte’s analysts revealed a range of predictions, including the importance cybersecurity and…

What is Cyber Security

What is Cybersecurity? Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats. It is a practice used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems. A strong cybersecurity strategy can provide a good security posture against malicious attacks designed to access,…

What Is Personally Identifiable Information (PII)

What Is Personally Identifiable Information (PII) Personally Identifiable Information (PII) is a term relating to information security environments. While PII has several formal definitions, generally speaking, it is information that can be used by organizations on its own or with other information to identify, contact, or locate a single person, or to identify an individual…

Micro-Segmentation is the Answer.

The idea of segmenting the network as a way to increase security is new. But it has been difficult to achieve granular segmentation because computing and security have been tied at the hip. That means any changes made to attain the desired security posture require changes to the underlying network transport or sacrifice granularity. In…

Protecting your school against Ransomware

Every day we hear about a new cyber attack. The targets are often public infrastructure like pipelines or companies that provide third-party services, but public agencies and school districts are just as vulnerable and have suffered many ransomware attacks in recent years that disrupt school services and cost millions of dollars. An intrusion, often caused when a single stolen credential…

Gadget Access Privacy Policy

Privacy Policy Gadget Access understands you as a client of our company may have concerns about the privacy, confidentiality, and security of information we may obtain from your company. Our policy is to protect our clients’ privacy and confidential information collected; this includes physical security, computer and network security, communications security and personnel security. Gadget…

Pointers on the Russia-Ukraine crisis

We’re all guilty of the doom-scrolling and most of us are feeling pretty powerless to help as we watch the tragic Ukraine crisis unfold. Our colleagues at Digital Shadows have put together some pointers  to help security leaders and practitioners prepare for potential Russian cyber threats that could impact their organizations. Before we start, I…

Threat Intelligence Platforms

What are threat intelligence platforms? Threat Intelligence Platforms (TIPs) are critical security tools that use global security data to help proactively identify, mitigate and remediate security threats. New and continually evolving threats are surfacing every day. While security analysts know the key to staying ahead of these threats is to analyze data on them, the…

Practical Zero Trust Framework Approaches

Zero Trust is a conceptual and architectural framework for moving security from a perimeter-based security model to minimizing trust by continuously verifying secure access, authentication, and authorisation. While this sounds simple, it requires both a shift in mindset and major changes in the deployment and use of security technologies. Creating a detailed roadmap that outlines…