3 Pillars of ISMS

Every day, you might use a mobile device to make voice calls, send text messages, post articles on social media platform, and access information on the web. You likely also use a laptop or tablet to communicate, perform work, store work files, video conference, or watch recorded files. Your personal and work data are recorded on these devices moment-by-moment. These files are backed up in local as well as offsite infrastructure. Each new device doesn’t just drive traffic, it also dramatically expands the network attack surface - increasing the opportunity for cybercriminals to leverage sophisticated methods to exploit these opportunities. As a result, we are seeing the rise in cybercrime, and cybersecurity incidents that exploit data found on your devices, on-premises systems, as well as offsite cloud infrastructure.

Compromised, now what?

The online threat landscape is ever-changing. Recently, a functional Microsoft Remote Desktop exploit was publicly released that allows an attacker to gain System access; furthermore, all versions of the popular email delivery software EXIM is reported to be remotely exploitable, enabling an attacker with superuser access to 57% of the worlds email delivery systems.

Researcher Publishes Windows Zero-day Vulnerability on Twitter Violating Disclosure Policy

We have all seen Microsoft products topping the vulnerability charts back in 2017. This year doesn’t look any different with major vulnerabilities making headlines frequently. A researcher published a Zero-day vulnerability on twitter raising the eyebrows of security experts across the world since the vulnerability was made public before informing Microsoft.