Sungard AS Blog | //CYBER SECURITY

    10 Cyber Security Tips for Any Growing Business

    By Sungard AS The internet has brought huge advantages to small- and medium-sized businesses. But it also brings the risk of cyber attacks, attempts to steal...

    Could Legacy IT Sink Your Ship?

    By Sungard AS It was discovered last year that many maritime vessels were under significant threat of cyber breaches because they were using outdated software. Tankers...

    The Consequences of a Cyber Security Breach

    By Sungard AS 2016 saw a marked upturn in the volume and creativity of hacks and mega breaches, with LinkedIn, Tumblr, Yahoo, AdultFriendFinder, Three Mobile, and...

    Creating a Cyber Security Incident Response Plan

    By Sungard AS The number, sophistication and severity of cyber attacks is increasing, and any business handling customer data, which can be easily monetised, is a top...

    5 Steps to Assess and Mitigate Cyber Security Risks

    By Sungard AS As multinational enterprises put more resources into security and breach prevention, criminals are increasingly diverting their activity towards smaller...

    Small Businesses: A Goldmine for Hackers

    By Sungard AS News reports of cyber-attacks tend to focus on corporate giants and high-profile brands. But a worrying trend is emerging among small businesses, which...

    Shedding tears over WannaCry

    By Sungard AS Organisations worldwide were hit by the WannaCry cyberattack, which crippled over 200,000 computers in more than 150 countries worldwide. Repercussions...

    The #1 Cyber Security Threat To Information Systems Today

    By Sungard AS Vulnerable web applications are among the greatest cyber security threats to information systems today. Cyber security is a top concern in the IT...

    Leave Your Laptop In Your Car And 9 Other Bad Cyber Security Habits

    By Sungard AS In a perfect world, employees would have excellent cybersecurity habits and never put the company's network or data at risk. This isn't a perfect world,...

    What Is Identity Management?

    By Sungard AS Identity management (sometimes known as identity and access management) helps corporations manage and control user access to different systems on a...

    Four Things Every Business Continuity Expert Needs to Know About Cyber Security

    By Sungard AS Halloween is here – time for kids to go trick-or-treating, for teens to visit haunted houses, and for Americans to spend nearly $7 billion on costumes,...
    x

    SUBSCRIBE TO OUR BLOG

    Advice, stories, and expertise about work life today.

    x

    THANK YOU!

    We know your inbox is protected space, so we promise to send only the good stuff, twice a month.