ECHOSEC SYSTEMS
5 Current Cyber Attack Techniques and How to Stay Threat-Informed
Echosec Systems
February 13, 2020
Cyber Security,
Open Source Threat Intelligence,
Information Security
Cybersecurity teams are increasingly taxed with keeping up to the threat actors exploiting digital security vulnerabilities. These vulnerabilities are growing exponentially.
Read More
Cyber Security Breach: What Happens in the Fallout?
Echosec Systems
December 11, 2019
Cyber Security,
Executive Protection,
Information Security,
Corporate Security
Updated: March 17, 2020 Cyber security breaches often go undetected—until a service department hears a customer complaint, an individual notices funds depleted from their bank account, or other unfortunate consequences come to light.
Read More
*Originally posted Jan 5, 2016. Updated for accuracy Nov 1, 2019 The Deep Web is Where All the Criminals Hang Out, Right? Well, yes and no. To really understand what the deep web is, it helps to talk about what the Internet actually is.
Read More
One of law enforcements’ largest barriers to cyber investigations is its inability to access online intelligence quickly and safely. This information can be critical to finding who committed the crime, whether it’s a drug bust or identity theft.
Read More
According to IBM’s CEO Ginni Rometty, cybercrime is the “greatest threat to every company in the world.” Data security is a top priority for organizations avoiding business disruption, reputation damage, and data and financial loss. In fact, the average total cost of a data breach was recently estimated at USD $3.92 million.
Read More
In 2016, GCN conducted a cybersecurity survey across local governments in the United States. More troubling than the rate of cyberattacks it found being committed was the fact that many local jurisdictions were unaware that they were being targeted, or did not keep track of cyberattacks at all.
Read More
An interesting read from Maurits Martijn exploring public WiFi security reveals just how easy it is for a skilled hacker to exploit you and ruin your life if they so choose.
Read More
Since the dawn of the smartphone, it seems as if digital communication has become more common than face-to-face interactions. It is not uncommon for one person to have two computers, a tablet, and a smartphone.
Read More
It’s safe to assume that, in the internet era, all organizations and services will be targeted by malicious hackers sooner or later. It's not a matter of if, it's a matter of when.
Read More
5 Ways To Protect Your Intellectual Property On Social Media
Echosec Systems
May 12, 2015
Asset Management,
Cyber Security,
Brand Protection,
Information Security
Our thanks to Stephanie Meadows for letting us re-post her article on 5 ways to protect your intellectual property on Social Media. It was originally published on LinkedIn
Read More
Categories
- OSINT (39)
- Cyber Security (23)
- Brand Protection (22)
- Social Media Monitoring (19)
- Corporate Security (13)
- Information Security (13)
- Open Source Threat Intelligence (12)
- Privacy (11)
- Dark Web (8)
- Digital Investigation (8)
- General (8)
- Geofencing (8)
- Asset Management (7)
- Executive Protection (7)
- Retail Security (7)
- Event Monitoring (5)
- National Defense (5)
- machine learning (5)
- Emergency Response (3)
- Journalism (3)
- Data Breaches (2)
- threat intelligence feeds (1)