Cyberlink Security
  • home
  • services
  • about us
  • blog
  • get in touch
  • home
  • services
  • about us
  • blog
  • get in touch

Cyberlink Security Blog

Cork University Hospital Cybersecurity

Ransomware attack on Cork University Hospital computers

As you have probably read, computers from the HSE were infected with ransomware last week. The HSE was forced to shut down parts of its IT operation to contain the spread of the cyber attack. Ransomware is a very lucrative business model for cyber criminals and another recent case, the Colonial Pipeline case, shows how […]

Read More
hacker for cc

Will quantum computers break today’s encryption?

Short overview between classical computing and quantum computing. Classical computers carry out logical operations using the definite position of a physical state. These are usually binary, meaning its operations are based on one of two positions. A single state – such as on or off, up or down, 1 or 0 – is called a […]

Read More
gdpr

A look into GDPR and the late Easy Jet Breach

A brief description of GDPR   The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy in the European Union (EU) and the European Economic Area (EEA). It also addresses the transfer of personal data outside the EU and EEA areas. The GDPR’s primary aim is to give […]

Read More
cyber header 2

What am I protecting my cybers from? (part 2)

This is the second part of the blog post on risk management as part of your cyber security strategy. In the first part I shared my approach to risk management with you, which is primarily to identify your threats by answering the question “What can possibly go wrong?”. You have several means at your disposal to help […]

Read More
are the browser wars over

Are the browser wars over?

Some thoughts on the situation at Mozilla and the impact on Firefox… As you may have heard, a few weeks ago Mozilla had to reduce their workforce by 250 people. This is the second time this year that they have reduced their workforce. Already some people think that this may mean the end for the […]

Read More
Newer
12…4
Older

Recent Posts

  • Ransomware attack on Cork University Hospital computers
  • Will quantum computers break today’s encryption?
  • A look into GDPR and the late Easy Jet Breach
  • What am I protecting my cybers from? (part 2)
  • Are the browser wars over?
  • Why so many bitcoin scams? They are cheap, easy, and efficient to execute.
  • What does it take to build good pentest boxes to test cyber security skills?
  • What am I protecting my cybers from? (part 1)
  • What do I need to protect with cybersecurity?
  • Why are we seeing such high profile failures of cybersecurity?
  • What happens to my cybersecurity if I use cloud services to outsource my IT?
  • Who are my Cyber Stakeholders?
  • Why should my organisation have a cybersecurity strategy?
  • Is ISO27001 a good basis for your Cyber Security Strategy?
  • PECB United Kingdom has signed a partnership agreement with CyberLink
  • Four reasons why traditional information security fails in agile environments
  • Vulnerabilities to exploit a Chinese IP camera
  • Verizon issues their 2020 Mobile Security Index report
  • Why Traditional Information Security Fails
  • Why is Cyber Security Important?
We use cookies to ensure that we give you the best experience on our website. You can choose to accept or decline. OkNo Thank You