Visa Europe revealed important stats about the usage of Contactless Cards. Poland, Spain and the UK use this payment methd the most, with UK usage growing by 300% year over year.
Visa Europe revealed important stats about the usage of Contactless Cards. Poland, Spain and the UK use this payment methd the most, with UK usage growing by 300% year over year.
It is no news anymore that Russia started the largest war in Europe since Second World War. In an unstable system like the current global order, it is absolutely a singularity: an unexpected event that could lead to arbitrarily large effects. Nobody really wanted to believe it was happening but here we are, not knowing what the next few days and weeks will make of the world order as we know it.
Most are conscious already that in 2022 wars are not only fought in the physical realm. The modern world is dominated by technology, modern technologies are often interconnected through data networks, and more than often that network is the Internet.
This means that cyber soldiers can sit in the comfort of their homes (in the discomfort of their shelters like the Ukrainians right now) and still be able to cause major damage to critical infrastructures.
For example, Ukraine suffered the latest blow in an ongoing campaign of cyber attacks as Russian aircraft attacked Ukrainian cities. A number of government and bank websites in Ukraine crashed on Wednesday, according to the BBC. It comes just over a week after a similar attack caused the downtime of 70 Ukrainian government websites. Ukraine computers were hit by data-wiping software as Russia launched an invasion.
Both Ukraine and the United States have accused Russia and is difficult to think they are wrong.
Ukrainians, on their side, are not holding still. Ukraine has called its hacker underground to help protect critical infrastructure and conduct cyber spying missions against Russian troops according to Reuters.
"We are creating an IT army," Vice Prime Minister Mykhailo Fedorov wrote in a Tweet that linked to a channel on the Telegram messaging app which published a list of prominent Russian websites.
Cyber armies are converging and fighting in support of one side or another, but how long will it be before they turn their attention to businesses instead, and what guarantees us that it will be someone else's business?
I strongly believe war is a disgrace to both fighting parties, and in the hashes of this cyberwar, we will find highly skilled cyber experts who are in extreme poverty on either side; guns for hire. In a world where cryptocurrency exchanges can easily be carried out in stealth mode, are your competitors likely to hire them?
Better safe than sorry is one of my guiding principles. We have been gearing up for these cyber battles for years and as this conflict escalates, we have designed the following steps specifically to respond to targeted cyber-attacks and make full use of our Advantio MDR (Managed Detection and Response) and all connected technologies in use at our MSOC.
Our goal today is to share these with you so that you can protect your business and focus on growing it efficiently.
Stay safe,
Marco Borza
Do not forget that these actions should be applied on top of existing business continuity initiatives.
As a multinational with a strong presence in Ukraine, we want to make sure our Ukrainian colleagues are also provided with adequate, and often bespoke, security controls. We have laid down a summary of all the recent measures taken to enhance our SOC - read here.
We know cyber security is one of your primary concerns right now, but it should not be your primary responsibility during this challenging time - let us be your trusted security partner.
Cyberattacks will increase dramatically over the coming weeks amid the ongoing conflict. In order to protect the assets of your executives and management team, we are offering the Advantio MDR (Managed Detection and Response) service FREE until the end of May 2022.
While we strive to help everyone, our capacity is limited. Hence, we will work on a first-come-first-served basis, and our existing clients will be given priority.
Reach out to us now and start protecting your business today.
Interesting reading and useful resources:
Column Header Text | Column Header Text | Column Header Text |
Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection. |
Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection. |
|
Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection. |
Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection. |
Their work should have not stopped there because achieving compliance is an occasional result that doesn't ensure a continual protection. |
Performing a review of the media inventories at least annually |
Performing a review of the media inventories at least annually |
Performing a review of the media inventories at least annually |
Row Header Text |
Lorem ipsum dolor sit |
Lorem ipsum dolor sit |
23 |
Row Header Text |
Lorem ipsum dolor sit |
Lorem ipsum dolor sit |
23 |
Row Header Text |
Lorem ipsum dolor sit |
Lorem ipsum dolor sit |
23 |
Row Header Text |
Lorem ipsum dolor sit |
Lorem ipsum dolor sit |
23 |
Row Header Text |
Lorem ipsum dolor sit |
Lorem ipsum dolor sit |
23 |
Row Header Text |
Lorem ipsum dolor sit |
Lorem ipsum dolor sit |
23 |
Row Header Text |
Lorem ipsum dolor sit |
Lorem ipsum dolor sit |
23 |
Row Header Text |
Lorem ipsum dolor sit |
Lorem ipsum dolor sit |
23 |
Image caption goes here. This is HTML text.
I am the Founder of Advantio.
Technology has been my passion since I was a kid; when I first heard the handshake of an old 300bps modem I realised security would be key in an interconnected world. Since then it has become my passion and primary focus.
The reason why I've started my own business is to make IT Security simple.
Certifications: CISSP / CCSA (Checkpoint) / ITIL Foundations / ACSA (ArcSight)/ Linux+/ PCI-QSA / PA-QSA
Comments