Articles
ICO Data Protection Checklist for Processors
The British Information Commissioners Office (ICO) has released an extensive guide to explain the new EU General Data Protection Regulation (GDPR) and assist corporations in achieving compliance. One extremely useful first step, found in the ICO site is the Data Protection Self-Assessment questionnaire for organizations. This ICO Data Protection Checklist[…]
Read More »Virus Back to Basics Attacks – Wiper – Erase & Destroy
When the first Malware appeared quite a few years ago one of the most common types were Erase and Destroy – Wiper Malware. The actions that these viruses would perform, would be to erase and/or wipe data from hard disks. Attackers who would use this attack angle have the singular[…]
Read More »ICO Data Protection Checklist for Controllers
The British Information Commissioners Office (ICO) has released an extensive guide to explain the new EU General Data Protection Regulation (GDPR) and assist corporations in achieving compliance. One extremely useful first step, found in the ICO site is the Data Protection Self-Assessment questionnaire for organizations. This ICO Data Protection Checklist[…]
Read More »The Athens Conservatoire – Guest WiFi
CYBERTECH® INFORMATION SYSTEMS LTD has donated the Wi-Fi system for the Athens Conservatoire, the oldest and most prestigious educational institution on performing arts in Greece. The newly installed infrastructure is donated by CYBERTECH as part of its support of the Arts and its Young Generation Corporate Initiative. The system covers[…]
Read More »Bad Rabbit – New Ransomware Outbreak
There have been several large-scale ransomware campaigns over the last several months. On October 24, 2017, a widescale ransomware campaign affecting organizations across eastern Europe and Russia has been detected. This appears to have some similarities to Nyetya in that it is also based on Petya ransomware. Major portions of[…]
Read More »