Cryptojacking – Threat, Impacts and how to protect business from becoming a victim

Blog When Microsoft blocked more than 400,000 cryptojacking attempts in one day, businesses feared that an outbreak was underway. It was only a tip of the iceberg. More than 55 percent of businesses worldwide have faced crypto mining attacks. With cybercriminal groups launching more and more attacks to infiltrate networks and quietly mine for coins,… Continue reading Cryptojacking – Threat, Impacts and how to protect business from becoming a victim

Published
Categorized as Blogs

Why you should upgrade your MDR solution in 2019

Blog Even a casual glance at newspaper headline reveals that the number of security breaches across the globe has gone up drastically. Dunkin Donuts recently reported a security breach that affected consumers who had signed up for its rewards program DD Perks. Marriott too disclosed a massive data breach exposing personal and financial information on… Continue reading Why you should upgrade your MDR solution in 2019

Published
Categorized as Blogs

Securing your organization with credential-based vulnerability assessment

Blog In Q1 2017, about 1,254 breaches reportedly took place – most of which occurred due to a known vulnerability: insufficient or improper input validation. Vulnerabilities such as the above occur due to either coding errors or security misconfiguration, which the attackers quickly exploit to access system memory, execute insidious commands, steal data, etc. Now,… Continue reading Securing your organization with credential-based vulnerability assessment

Published
Categorized as Blogs

Mitigating Data Breaches in Payment Security with SISA’s PaySIRF

Blog Rising payment security incidents and breaches has still not spurred most organizations to institute an effective plan to handle threats. Payment breaches are highly targeted and motivated attacks, prompting the payment industry regulatory body to come out with Requirement 12.10 as part of PCI Compliance standards, which effectively necessitates that organizations have an incident… Continue reading Mitigating Data Breaches in Payment Security with SISA’s PaySIRF

Published
Categorized as Blogs

Top 5 Considerations in PCI DSS Card Data Discovery

Blog Payments made through the Internet, mobile networks, and WiFi, or made at an electronic cash register carry the risk of compromising card information. For instance, when you swipe your card at a retail outlet, the payment terminal sends card data to the acquirer over the network passing multiple systems. The storage, processing, and transmission… Continue reading Top 5 Considerations in PCI DSS Card Data Discovery

Published
Categorized as Blogs

Cyber Security Risks In Social Media Banking

Blog Social Media is the most used platform on day-to-day basis by millions of people around the world. Social media banking is the usage of social platforms such as Facebook, twitter, WhatsApp for Marketing, communication, for collecting feedback and reactions and to perform Banking Operations such as Transactions, Account summary and status enquiry, etc. We… Continue reading Cyber Security Risks In Social Media Banking

Published
Categorized as Blogs

PCI Standards for India’s Emerging Digital Payment Modes

Blog The “Digital India” initiative launched in 2015 and “Demonetization campaign” in November 2016 by the Government of India has provided the major boost to the country’s digital ecosystem. Along with initiatives such as “DigiShala”, the government has aimed at building an ecosystem for entailing ‘cashless economy’ in the country. Other initiatives such as the… Continue reading PCI Standards for India’s Emerging Digital Payment Modes

Published
Categorized as Blogs

8 Steps to Protect Your Organization from Fake Response Malware

What is a fake response malware? A fake response malware is a type of malware that intercepts and modifies responses from web servers or an application server. This can be used to steal sensitive data, such as passwords and credit card numbers. Fake response malware works by intercepting the communication between a browser or application… Continue reading 8 Steps to Protect Your Organization from Fake Response Malware

Published
Categorized as Blogs
SISA’s Latest
close slider

Webinar

Infosec Report

The current query has no posts. Please make sure you have published items matching your query.