infographic

How to protect yourself against phishing attacks

INFOGRAPHIC Hackers and scammers employ phishing as a means to steal personal information like credit card numbers, website login details and phone numbers. The infographic below offers some best practice tips for safeguarding yourself against this increasingly common form of identity theft, which is tricky to detect. This infographic has been designed by Inspired eLearning, which is dedicated to delivering the highest quality enterprise educational products that transform corporate culture, nurture and enhance workforce skills, and deliver maximum ROI for the corporate education budget.

Free Download: the CyberSecurity Crashcourse Are you even aware if you have been the victim of a cybersecurity breach?

This report will help you to find out and protect yourself, Eric Hansleman from 451 Research presents a rapid-fire overview of cybersecurity , because a firewall just won t do, you need multi-layered defences to truly protect your data.

Click here to download now Related Topics Grenfell inquiry begins: The numbers that lay bare the funding crisis hampering high-rise improvements The growing menace of cyber-attacks targeting critical national infrastructure The phishing threat in numbers

The growing menace of cyber-attacks targeting critical national infrastructure

infographic The number of cyber-attacks targeting critical infrastructure grew by 20% between 2014 (245 incidents) and 2015 (295 incidents), according to a 2015 report by the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). The infographic below, which was designed by Norwich University s online Master of Science in Information Security & Assurance degree programme, provides some insights into the growing problem. It explores how attacks breach computer networks in the energy sector, transport and other critical infrastructure, as well as the economic impact and efforts to mitigate risk.

Free Download: Securing the UK s borders. Getting national security and Brexit right first time is crucial , we do not want to get this wrong. This report considers the implications of leaving the EU for the management of the UK s borders and making it as easy as possible for international business to thrive and legitimate movement to occur in a post-Brexit UK.

Click here to download now

The phishing threat in numbers

infographic Did you know that the average company with 10,000 or more employees spends $3.7m a year dealing with phishing threats? For more shocking facts and stats about this persistent threat to data security check out the infographic below. This infographic has been designed by Inspired eLearning, which is dedicated to delivering the highest quality enterprise educational products that transform corporate culture, nurture and enhance workforce skills, and deliver maximum ROI for the corporate education budget.

Free Download: the Cyber Security Crashcourse This report contains 40 slides packed with insight into the trends shaping the industry and how you can protect yourself.

Eric Hansleman from 451 Research presents a rapid-fire overview of cyber security.

Click here to download now

Radiation-blocking underwear and 18 other bizarre smart things that could let hackers into your smart home (and one device to protect you)

No object, however mundane, cannot be improved with a computer chip: this seems to be the philosophy driving development of smart things in the smart home arena. It was partly this scattergun approach that prompted Wired magazine to prophesise the demise of the internet of things (IoT) at the start of 2017. Click on the icons in our infographic below to check out 19 of the most bizarre or according to IoT sceptics pointless devices that are creating new vectors of attack for cybercriminals.

Security is little more than an afterthought on too many devices, with criminals able to guess default usernames and passwords by trawling Google. We haven t chosen these 19 devices based on security some may have very rigorous security mechanisms in place. Rather, we chose the most bizarre devices, and paradoxically, in this context, bizarre also means mundane the point being: is a smart hair brush or smart fork really going to deliver benefits that warrant creating new avenues through which hackers could break into your home network? Several products designed to boost IoT security were launched at CES 2017, suggesting the industry is waking up to the threat. We ve included one of them below flagged with a red icon. Free Download: the Cyber Security Crashcourse This report contains 40 slides packed with insight into the trends shaping the industry and how you can protect yourself. Eric Hansleman from 451 Research presents a rapid-fire overview of cyber security.

Click here to download now

The international league table of cybersecurity: How cyber-safe is your country?

infographic The infographic below details the countries that are the most and least safe in terms of vulnerability to cyber-attack. Full of fascinating comparisons, the visual gives league tables for the countries with the highest and lowest rates of malware infection; the highest number of users attacked with ransomware; the most targeted countries for web app attack traffic; the highest percentage of global DDoS attacks; those most affected by cyber espionage; and many more Thank you to Comparitech.com for letting us use this infographic. Comparitech.com is a consumer advice resource that helps consumers make better decisions when they subscribe to tech services such as VPNs, antivirus and security products.

Source: Comparitech.com Free Download: the Cyber Security Crashcourse This report contains 40 slides packed with insight into the trends shaping the industry and how you can protect yourself.

Eric Hansleman from 451 Research presents a rapid-fire overview of cyber security.

Click here to download now

The shocking skills shortage in fire industry in numbers

Infographic The skills shortage in fire systems engineering is a problem long in the making. Whether you blame a lack of formal qualifications, a UK culture that many think undervalues engineering as a profession, or New Labour s obsession with boosting numbers of non-vocational university degrees, we re clearly reaching crisis point. If you doubt that fact, then the facts and numbers detailed in the infographic below put together by the FIA might help to convince you.

It s a problem the FIA is taking very seriously. What a qualification in fire detection and alarm systems might look like is set out by Martin Duggan in this article. THe FIA has also put together this video about the skills crisis.

Visit FIREX International for cutting-edge solutions, essential knowledge and the ability to grow your business by getting direct access to the whole fire safety industry. It is the perfect place to get your product in front of thousands of buyers, across a multitude of featured areas. From the brand new Drone Zone, the ARC Village, ASFP Passive Protection Zone, the Engineers of Tomorrow competition and more, it s all under one roof so you ll never miss a beat.

Click here to register your place now to join us at London Excel on 20 22 June

The numbers behind the inexorable rise of cyber threats infographic

The Numbers Behind The Inexorable Rise Of Cyber Threats Infographic

The accusations emanating from Washington about state-sponsored interference in November s US election have taken the cyber security debate into unchartered waters. Not only is the number of attacks worldwide soaring but they are undertaken in ever-more sophisticated ways, by both state and non-state actors, and undertaken for increasingly imaginative purposes. Norwich University s Online Masters of Arts in Diplomacy programme has compiled some data-driven insights into the the rise of cybercrime and terrorism.

The infographic below original source here examines the costs of cybercrime and cyber terrorism, the sources of attacks, strategies for combating the threat and how often various sectors are targeted.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

Cloud-based disaster recovery: the benefits, catastrophic costs of downtime and questions to ask providers infographic

Cloud-based Disaster Recovery: The Benefits, Catastrophic Costs Of Downtime And Questions To Ask Providers Infographic

Enhancing resilience defined in the security world as the ability to withstand and recover quickly from disruptive or disastrous events is growing more important for businesses and cities alike. And in our increasingly connected, digitised economy a big part of achieving this is preparing for disruption to computer systems and the corruption or loss of data. The dramatic growth in cloud-based services has triggered a corresponding rise in demand for cloud-based disaster-recovery plans.

Courtesy of Ireland-based IT solutions company ERS Computer Solutions Ltd, which provides cloud-based disaster-recovery services, the infographic below outlines why businesses use such services, how long it takes to recover from site disasters, the average cost of downtime, issues to consider before adopting this model and questions to ask providers of cloud-based disaster services.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

CCTV procurement infographic: How a Total Cost of Ownership (TCO) model can help you make better decisions

CCTV Procurement Infographic: How A Total Cost Of Ownership (TCO) Model Can Help You Make Better Decisions

Building a cost-effective video surveillance system isn t easy. There are many factors and ongoing costs to consider before you make procurement decisions. Axis Communications, one of the biggest, most respected names in video surveillance, has put together an infographic that distils some interesting insights from a new report from the company on measuring your total cost of ownership (TCO) when procuring CCTV systems.

Axis has compiled a comprehensive TCO study of a large-scale city surveillance system using 40 costs relating to different system components and stages. Scroll down to the infographic below. For more insights on this subject download the Axis report on measuring your total cost of ownership (TCO) when procuring CCTV systems.

Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

Are you safe in your home?

The history (and future) of home security