SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Stories by Mark Gorrie

Story image
Watch out! There are hidden dangers lurking in your PDFs
Last week
#
malware
#
advanced persistent threat protection
#
email security
PDFs' convenience inadvertently aiding cybercriminals: Avast researchers reveal PDF files increasingly exploited to distribute malware and carry out scams.
Story image
One wrong click can devastate your small business: so what can you do?
Last week
#
advanced persistent threat protection
#
compliance
#
cybersecurity
Small businesses can fortify cybersecurity, bolster compliance, and support employee productivity with web domain and content filtering tools like Avast Business Web Control.
Story image
Why Whac-A-Mole is not a strategy for defending against ransomware attacks
Thu, 23rd Nov 2023
#
cloud services
#
ransomware
#
cybersecurity
SMBs should also consider strong personnel practices and awareness to implement a better defensive strategy than Whac-A-Mole.
Story image
Gen supports cyber safety for small businesses through the Avast business portfolio
Fri, 8th Sep 2023
#
firewall
#
network security
#
breach prevention
The Gen portfolio of solutions for small businesses will help small businesses and scale to stay ahead of the latest cyber threats.
Story image
Is ChatGPT’s use of our personal data even legal?
Tue, 25th Jul 2023
#
data protection
#
contact centre
#
chatbots
As the field is always evolving, laws and regulations surrounding personal data use in AI are likely to evolve too.
Story image
Deepfake and AI 101: Twelve tips to spot a deepfake
Mon, 1st May 2023
#
ml
#
physical security
#
email security
Deepfake technology can be used maliciously or with unethical intent, and this means deepfakes are a potentially dangerous tool.
Story image
Norton’s 11 tips to help protect your privacy online
Wed, 15th Mar 2023
#
cloud services
#
cybersecurity
#
norton
Governments, businesses, and individuals can buy information about you that's been gathered online, like your health status, contact details and your location.
Story image
Twelve social media threats to watch for in 2023
Mon, 14th Nov 2022
#
malware
#
phishing
#
email security
There are so many social media platforms for us to choose from— and the same is true for cybercriminals looking to deploy their next attack.
Story image
The most common types of identity theft and top ten ways to avoid it
Tue, 6th Sep 2022
#
cloud services
#
physical security
#
cybersecurity
1 in 5 New Zealanders have experienced identity theft, with 5% impacted in the past year. Learn the most common types and how to prevent it.
Story image
Deep web vs dark web: NortonLifeLock explains the difference
Tue, 26th Jul 2022
#
dark web
#
cybersecurity
#
deep web
NortonLifeLock managing director for APAC Mark Gorrie explains what you need to know about the deep and dark web and the pros and cons of both.
Story image
Encryption: What it is, how it can help, and what to watch out for
Wed, 1st Jun 2022
#
bi
#
big data
#
malware
VPN Encryption: How it Protects Your Data and Keeps the Internet Secure. Learn about encryption and its role in internet security. #CyberSecurity.
Story image
The future of digital identity: the need for systems reform
Thu, 7th Apr 2022
#
cybersecurity
#
physical security
#
online verification
Identity credentialing, proving you are who you say you are, needs to catch up to the technologies available. Currently, most organisations use simple means.
Story image
Website spoofing: What to know about counterfeit domain names to keep from getting scammed
Wed, 2nd Mar 2022
#
web development
#
cybersecurity
#
ssl
Have you ever visited the website of a well-established brand but something about it didn't seem right? That may not have been the brand's website at all.