Estimated reading time: 3 minutes
The key theme of today’s day and age is “connected”. Whether it’s the Internet of Things (IoT), connected solutions and mobility, the world’s electronic devices are getting increasingly connected, which of course, the amount of information being collected as...
Estimated reading time: 3 minutes
Cybersecurity threats compel us to revisit certain identity-based terminologies and Personally Identifiable Information is probably one of the most important ones. Personally Identifiable Information (PII) signifies any substantial information or data that can help a governing body trace the...
Estimated reading time: 3 minutes
Last year we saw two high-profile ransomware attacks strike within a few weeks of each other, affecting more than a quarter million machines worldwide and causing major disruptions. With the adoption of the Eurocard/Mastercard/Visa payment standard increasing, credit card...
Estimated reading time: 3 minutes
Since WannaCry swept the world in 2017, ransomware has become a network administrator’s worst nightmare. It’s not without any reason: the devastating WannaCry ransomware attack affected more than 200,000 computers across 150 countries with huge damages. Other notable ransomware attacks...