Tag Archive for: Switch

Delinea report highlights switch in ransomware techniques


Delinea recently published its annual State of Ransomware report. The analysis revealed an upward trend in ransomware, signalling a shift in cybercriminal strategies. Traditional techniques of incapacitating a business and demanding a ransom have given way to stealthier methods, such as exfiltrating confidential data to sell to the top payer on the darknet or utilising it to demand substantial cyber insurance settlements.

The research, entitled ‘State of Ransomware 2024: Anticipating the Battle and Strengthening Your Defenses,’ analysed Censuswide survey data from more than 300 American IT and Security decision makers. The research sought to uncover significant shifts compared to previous year data and determine emerging trends. Primary among them is a resurgence of ransomware; even though the numbers have not yet reached the 2021 peak, the proportion of organisations citing themselves as recent victims more than doubled from 25% to 53%. Mid-sized businesses have emerged as the prime targets of cybercriminals, with 65% of these organisations noting incidents of ransomware in the last 12 months. There are also more victims paying ransoms than before, with the figure increasing from 68% to 76% since the last year.

Interestingly, the survey shed light on new motives, strategies, and tactics. There was a 39% surge in data exfiltration, shifting from 46% to 64% and becoming the motive of choice for attackers. This move towards stealing sensitive data to sell on the darknet is demonstrated in the significant decline in traditional money extortion, which dropped from 69% to 34% this year.

Rick Hanson, President at Delinea, stated, “Ransomware certainly appears to have reached a critical sea change – it’s no longer just about the quick and easy payout. Even as organisations are investing more in safety nets like cyber insurance which often have ransomware payouts included in coverage policies, cybercriminals are finding that using stealth tactics to stay under the radar and access sensitive, valuable information to sell is the better investment of their effort.”

Another notable development is the shift in cyber criminals’ tactics. The preferred method moved from email (down…

Source…

Switch on these three iPhone settings NOW or risk hack attack


IF YOU’RE worried about iPhone hackers then we’ve got a few tips to help allay your fears.

From making your logins more secure to shielding your passwords from snoopers, here are the security settings worth knowing about.

Your iPhone has a bunch of handy features to help protect it from hackers

2

Your iPhone has a bunch of handy features to help protect it from hackersCredit: Alamy

Face ID

Once the preserve of sci-fi movies, facial recognition is now a mainstream technology.

Basically, it’s a way of identifying or verifying who a person by scanning their face with a computer.

Its main use is to make sure a person is who they say there are – like Apple’s Face ID, which uses facial recognition to unlock your iPhone.

To set up Face ID:

  • Go to Settings > Face ID & Passcode. If asked, enter your passcode.
  • Tap Set Up Face ID. 
  • Make sure you’re holding your device in portrait orientation, position your face in front of your device, and tap Get Started.
  • Position your face inside the frame and gently move your head to complete the circle. If you’re unable to move your head, tap Accessibility Options.
  • When you’ve finished the first Face ID scan, tap Continue.
  • Gently move your head to complete the circle for a second time.
  • Tap Done.
WhatsApp update introduces HUGE change for millions of users on iPhone
Best cheap iPhone SE 3 deals - pre-orders live NOW for Apple's budget handset

Two-factor authentication

Setting up two-factor authentication (2FA) is one of the easiest ways to stop hackers in their tracks.

It protects your account by requiring an extra level of verification before logging in – on top of your password.

It means that if your password has been hacked (or guessed), your account will still be safe.

You can activate 2FA on your Apple ID – the account which contain user personal information and settings, and which you need for iCloud.

Most read in Phones & Gadgets

Once enabled, you’ll be required to enter a special code sent via text or email, which you enter to log in addition to your password.

  • Go to Settings > [your name] > Password & Security. 
  • Tap Turn On Two-Factor Authentication.
  • Tap Continue.
  • Enter the phone number you want to receive verification codes on when you sign in. You can choose to receive the codes by text message or via an automated phone call.
  • Tap Next.
  • Enter the verification code to verify your phone number and turn on two-factor authentication.

iCloud keychain

Every…

Source…

Comparing house security with computer security – IT fundamentals



TP-Link JetStream 8-Port 10GE SFP+ L2+ Managed Switch – TL-SX3008F


Full Fiber Switch with Lightning-Fast 10G

Build and expand your lightning-fast network with TP-Link TL-SX3008F—a fully managed switch with full 8-port 10G fiber ports and 160 Gbps switching capacity. Ideal for small, medium, and large business networks, it meets and surpasses the needs for high-speed, reliable, and safe enterprise networks.

Seamless Integration to Omada Cloud SDN

Omada’s Software Defined Networking (SDN) platform integrates network devices, including access points, switches, and routers, providing 100% centralized cloud management. Omada creates a highly scalable network—all controlled from a single interface. Seamless wireless and wired connections are provided, ideal for use in hospitality, education, retail, offices, and more.

Advanced L3 Features**

An abundance of L2+ and L3 features are supported to help build a highly scalable and robust network, providing a reliable and efficient solution for enterprises, campuses and ISPs.

Secure Networking

Our high-quality security features defend against a range of network threats. They include IP-MAC-Port-VID Binding, Port Security, Storm Control, and DHCP Snooping. An integrated list of common DoS attacks is available, making it easier than ever to prevent them. The Access Control Lists (ACL, L2 to L4) restrict access to sensitive network resources by denying packets based on source and destination MAC address, IP address, TCP/UDP ports, or VLAN ID. User access to the network can be controlled through 802.1X authentication to grant access according to the valid user credentials.

Enterprise Level Features

A complete lineup of L2+ features is supported. 802.1Q VLAN, Port Mirroring, STP/RSTP/MSTP, Link Aggregation Control Protocol, and 802.3x Flow Control are among the innovative features. Advanced IGMP Snooping ensures the switch intelligently forwards multicast streams to appropriate subscribers and reducing unnecessary traffic, while IGMP throttling & filtering restrict subscribers at the port level to prevent unauthorized multicast access. Static Routing segments the network to route traffic efficiently.

Advanced Quality of Service (QoS)

Voice and video traffic and be prioritized…

Source…