Today’s post is by Ashley Riviello, Account Manager at SafeSourcing, Inc.
According to Forbes.com, there were 2,216 data breaches and more than 53,000 cybersecurity incidents reported in 65 countries in the 12 months ending in March 2018. People have been forced to increase their security and find new ways to keep our personal information safe. Just within the last 2 years we started using the chip process in our debit and credit cards. I think we all remember the data breach that happened March of 2018 where Facebook allowed to 87 million records to be breached. Millions of people had their personal information and other sensitive matter exposed for the public to see.
Hysolate is a company whose mission is to create a future-ready endpoint platform that provides the highest levels of both security and productivity. Led by experts in security and infrastructure, Hysolate is shifting the work environment into a new era. According to the CEO Tal Zamir of Hysolate,, “In 2019, the two main targets for cyber-attackers will be the cloud and user devices. Operating systems on user devices provide more functionality than ever before, making them more vulnerable and an easy target for attackers. At the same time, users will expect more flexibility and the ability to work with any OS, any application, and on any device. As organizations look to provide security, privacy, and productivity, they will have to shift to a new, ‘zero trust’ device architecture”. I honestly cannot think of a person that does not use cloud on their computer or their phone.
We as a society have become so accustom to completely relying on our devices for every aspect of our lives. Ordering food, using GPS, posting on Facebook, googling and many more other activities we do on a daily basis. With that, whether we like it or not, all of our information is everywhere. We put in our credit cards to buy stuff online, and we post every little thing we do on social media. So we rely on companies like Hysolate and other security companies that specialize in keeping our information safe.
Transunion stated that cyber security doesn’t involve just businesses and the government. Your computer, tablet and cellphone probably contain information that hackers and other criminals would love to have, like other people’s email addresses, names and birthdates. Suppose, for example, a hacker had access to your contact information. He could then send an email or text message to everyone you know, using your name, encouraging them to click on a link containing malware, like “Hey Jane, I thought you’d love this! Click here.” I know in the last month I have received multiple emails and text messages of this kind. So educate yourself, make yourself aware of these issues and keep your self-protected.
“When you are aware of the risks, it may be much easier to protect yourself from hackers, viruses and malware.” Transunion.com. In my next blog I want to go over the 3 principles of cyber-security and what we can do to help protect ourselves. Stay tuned…
For more information on how SafeSourcing can help in your procurement efforts, or on our Risk Free trial program, please contact a SafeSourcing Customer Service Representative. We have an entire team ready to assist you today.
- https://www.forbes.com/sites/ 2019
- https://www.transunion.com/blog/identity-protection/why-is-cyber-security-important 2019
3 Responses to “Information about Cybersecurity Part I”
Leave a Reply
You must be logged in to post a comment.