Cyber Security has become a requirement

Not only to protect commerce financially, but also legally...

you are a target

everyone is a victim

demand is growing

it can not be met

figures show

astonishing trends

Right now businesses are being pressured more and more to invest in additional security services in the attempt to keep up with evolving dangers. The consequences of not being prepared are/will be catastrophic for companies and their customers. In the process of deciding how to establish and operate a business, many business owners of varying power and influence hardly take into consideration the guaranteed attack on their information technology investments. If leadership does not lead by example, department managers will be uneasy about delegating to subordinates the required implementation of common sense computing safeguards.


the world and almost all technology is connected

With so many people on the planet having access to technology. With so many governments and markets being co-dependent on each other; the negative consequences of computer systems having control over civilization is endangering not only personal identities or payment transactions, but also national infrastructure safety and environmental integrity.

A Human Rights concern

cyber criminals and spies preying on the innocent

Illegal actions against individuals and companies are not only carried out by criminal cells, but also state-sponsored agencies and their non-governmental contracted propagators. Legitimate business operations are being affected by such revelations; this means profits will continue to be hampered if economic activity isn't left alone by the misuse of information technology systems.

Recent Posts

October 13

DDoS Attacks Cause Delays Across Sweden

DDoS attacks on two separate days have brought down several IT systems employed by Sweden's transport agencies, causing train delays in some cases. Officials said the attack was cleverly aimed at TDC and DGC. Read More...

October 12

Hyatt Hotels Suffers 2nd CC Breach in 2 Years

The hotel chain said the incident affected payment card information – cardholder name, card number, expiration date and internal verification code – from cards manually entered or swiped at the front desk of certain locations. Read More...

October 11

Classified Weapons Data Stolen Down Under

Australia's foreign intelligence collection agency says a hacker stole over 30 GB of data on the country's military capabilities, including details on fighter jets, military aircraft, and naval ships. Read More...

October 10

PHM Exposes Over 100k Patient Records

In the latest leak of sensitive medical records in the United States, lab test results and other patient files belonging to an estimated 150,000 Americans were unearthed online by security researchers late last month. Read More...

October 9

Hackers Target "Millions of PornHub Users"

Millions of internet users were recently targeted by a hacking group called 'KovCoreG' which took advantage of to spread booby-trapped downloads posing as browser updates. Read More...


Breach Level Index 1H 2017

Poor Internal Security Practices Take a Toll - the Findings

During the first half of 2017 there were 918 data breaches worldwide, compared with 815 in the last six months of 2016. That represents a 13% increase. Of these, identity theft accounted for three quarters of data breaches, an increase of 49% compared to the previous six months.

The rise is far more dramatic in terms of the number of records involved. Some 1.9 billion data records were lost or stolen during the first half, compared with 721 million during the previous six months, an increase of 164%. There were 22 breaches in which more than 1 million records were compromised, stolen, or lost in the first half of 2017.

And this isn't even the whole story when it comes to records. More than 500 data breaches (or 59% of the total) had an unknown or unreported number of compromised records. Over the next few years, this will most likely begin to change as governments enact regulations to improve transparency surrounding data breaches.

By: gemalto