SECURITY INSIGHT BLOG

Welcome to emt technology blog.
Unstuck Your Virtual Student

Unstuck Your Virtual Student

There are two simple truths when it comes to online learning:  Most teachers have years of experience in the classroom, but only a few months of experience teaching virtually. Most students have never had to learn virtually, and they have no idea how to do...

read more
3 Years of WannaCry: Millions of Endpoints Are Still Vulnerable Out There!

3 Years of WannaCry: Millions of Endpoints Are Still Vulnerable Out There!

Are you aware of the worst cyberattack of 2017, the WannaCry ransomware? WannaCry was one of the worst-hit ransomware attacks that surfaced around May 2017, in Asia. The malware spread like wildfire and infected more than 230,000 computers in a day. The WannaCry...

read more
KHDA recognises Certnexus as an international certification organisation in Dubai

KHDA recognises Certnexus as an international certification organisation in Dubai

Certnexus is an approved organisation in the USA, operating as an international certification organisation, and a global provider of vendor neutral, emerging technology certifications and micro-credentials for business, data, development, IT and security...

read more
ESET supports the fight against hatred and misinformation on social networks

ESET supports the fight against hatred and misinformation on social networks

The recent launch of the Stop Hate for Profit campaign has raised a great deal of awareness in the public forum about the problem of online content that promotes racism, hate, violence and, especially, false information. In our work to make the internet safer for...

read more
What Is Secure Copy Protocol (SCP)?

What Is Secure Copy Protocol (SCP)?

Does your business rely on the Secure Copy Protocol (SCP) to enable remote users to exchange files with each other and with customers and business partners? If so, it might be time to consider another approach! In 2019, ZDNet identified the Secure Copy...

read more
USING REMOTE DATA CENTER MANAGEMENT TO KEEP UP WITH PATCHES

USING REMOTE DATA CENTER MANAGEMENT TO KEEP UP WITH PATCHES

The need to patch doesn’t go away just because you’re stuck working at home. Without access to your network operations center (NOC) however, patching may be that much more difficult. If a patch causes an application failure, you might find that downtime lasts a lot...

read more
A new chapter for DLP: CoSoSys announces Endpoint Protector Enterprise

A new chapter for DLP: CoSoSys announces Endpoint Protector Enterprise

Our powerful, flexible and highly scalable Data Loss Prevention (DLP) solution package is on the way, addressing the risks of data loss and compliance of enterprise clients. We at CoSoSys are aware that in the age of digital...

read more
High-Risk Vulnerability in TeamViewer Could be Exploited to Crack Users’ Password

High-Risk Vulnerability in TeamViewer Could be Exploited to Crack Users’ Password

A high-risk vulnerability was found in TeamViewer for Windows. It is tracked as “CVE-2020-13699“, with a CVSS base score of “8.8” that could be exploited by remote attackers to crack users’ password and thereupon, lead to the further system exploitation. TeamViewer is...

read more
What is Application Rationalization?

What is Application Rationalization?

Good question.  Application rationalization has many interpretations. Gartner says “Application rationalization is the radical reshuffling of an application portfolio as part of an application strategy, a plan that implements changes to applications to...

read more
Why the COVID-19 pandemic has been a blessing for scammers

Why the COVID-19 pandemic has been a blessing for scammers

In case we needed any more proof, the COVID-19 pandemic has shown us once again just how ruthless scammers are. While people across the world have united to look after those around them in this time of emergency, hackers and malicious actors have shown no sign of...

read more
WHY YOUR DISASTER RECOVERY PLAN MUST INCLUDE INVENTORY TRACKING

WHY YOUR DISASTER RECOVERY PLAN MUST INCLUDE INVENTORY TRACKING

Disaster recovery needs to start with a pinpoint-accurate IT inventory. If you restore from backup–without restoring everything from backup–then it will throw a wrench in your dependencies. Worst-case scenario: the outage lasts longer and is harder to fix. Disaster...

read more
Pandemic Sees DDoS Attacks Jump 524%

Pandemic Sees DDoS Attacks Jump 524%

With most office workers still working at home, the network has now become the major linkage between employees and their jobs. Unfortunately, this means that the effects of DDoS attacks (Distributed Denial of Service)—large-scale attacks which rely on flooding...

read more
The Importance of Data Loss Prevention for the Mid-Market

The Importance of Data Loss Prevention for the Mid-Market

Mid-market companies underpin many of the world’s leading economies. In Germany, they account for the largest share of the country’s economic output and employ 60% of all workers. In the US, they have almost double the annual growth rate of a Fortune 500...

read more
Titus solutions well positioned to handle the changes brought by COVID-19

Titus solutions well positioned to handle the changes brought by COVID-19

So far, 2020 has not played out the way most people thought it would at the end of 2019. Cybersecurity specialists have been talking about the “dissolving perimeter” for years; systems have been slowly moving outside of the tight confines of a corporate data centre to...

read more