5 helpful gifs for understanding the world of cybersecurity

In terms of cybercrime, 2018 wasn’t been spectacularly different from previous years – we’ve covered all manner of topics in our blog, from phishing attacks to malware. For the regular readers, already accustomed to our self-indulgent gifery, you won’t be surprised that we thought we’d round off the year with a few gifs that we thought those working in cybersec would appreciate. And who knows, perhaps this lighthearted depiction of the very real threats that most users face will generate just a touch more awareness and cyber-savvy, making 2019 the year that users took back control! 

1. Email Security

This year, we have sent and received approximately 281 billion emails and Red Sift has been on a mission to encourage people to protect their inboxes and improve deliverability. With individuals, companies, and organizations alike heavily relying on emails to conduct day-to-day business, by using methods of verification such as DMARC, messages can be validated and recipients can rest assured that what they receive is from a legitimate sender.

2. Data Breaches

The enforcement of GDPR aimed to give individuals greater control of their own personal data and means that now, anybody entrusted with data has a responsibility to protect it. Should a company fall victim to a breach large fines will be incurred of up to €20 Million or 4% of the company’s annual turnover. Should GDPR have been in place in 2013 when Yahoo fell victim to a breach that saw 3 billion user accounts compromised, they would have been subjected to fines of up to $160 million! With these new laws introduced, now more than ever it pays to be protected when it comes to cybersecurity.

3. Hackers

Real-life hackers are not as cool as Dade Murphy or as glamorous as Angelina Jolie and have caused very real problems this year for the likes of MyFitnessPal, British Airways, and Marriott. This year saw hackers continue to grow more sophisticated, reinforcing the need for equally intelligent cybersecurity solutions.

4. Phishing

One of the most common ways hackers have been able to gain entry into our networks and compromise sensitive data in 2018 is via phishing attacks. When emails aren’t verified there is no way to tell if messages are legitimate, so people are easily fooled into giving away personal details by hackers that claim to be someone they’re not. In 2019, companies need to make sure that their emails are secure to protect themselves and their customers from the inevitable phishing attacks targeted at them every single day.

5. Shadow IT

Shadow IT refers to anything that is brought onto the corporate network without the blessing of IT and can be as simple as an employee using an online cloud service to store files without authorization. In 2019 we all need to stop lurking in the shadows and shine a light on how we operate online. Knowing which apps employees use and where data is stored means that you can better keep track of your cybersecurity, and stop your company’s defenses from ending up like this small toddler.

So that’s it from us for 2018 – thank you to all those who have joined us along the way. 

(and yes the gifs were perhaps not as “helpful” as they could have been but there’s always room for improvement next year 😉 )

Find out more about us!

To find out more about the Red Sift people, products, and platform, get in touch!

Get in touch

PUBLISHED BY

Clare Holmes

14 Dec. 2018

SHARE ARTICLE:

Categories

Recent Posts

VIEW ALL
News

Introducing DNS Guardian: Stop impersonation and spam caused by domain takeovers 

Rahul Powar

tl;dr: We’re thrilled to announce DNS Guardian — a new feature in Red Sift OnDMARC that can swiftly identify and stop domain takeovers that lead to malicious mail. Back in February, we shared updates with the community about SubdoMailing – an attack discovered by Guardio Labs. The attack was a form of subdomain takeover,…

Read more
Email

“What’s Next for DMARC”: Red Sift & Inbox Monster Webinar Recap

Red Sift

The recent webinar hosted by Inbox Monster, “What’s Next for DMARC: Data & Predictions for a New Era in Email Authentication,” featured insights from Red Sift and examined the significant changes brought by Yahoo and Google’s bulk sender requirements earlier this year.  It also offered a forward-looking perspective on the future of email authentication.…

Read more
Security

Navigating the Information Security Landscape: ISO 27001 vs. SOC 2

Red Sift

As cyber threats evolve, so do the standards and frameworks designed to combat them. Two of the most recognized standards in information security are ISO 27001 and SOC 2. What sets them apart, and which one is right for your organization? Let’s delve into the key differences. Purpose and Scope: Global Framework vs. Client-Centric…

Read more
News

G2 Summer 2024 Report: Red Sift OnDMARC’s Winning Streak Continues

Francesca Rünger-Field

We’re delighted to announce that Red Sift OnDMARC has again been named a Leader in G2’s DMARC category for Summer 2024. This recognition is based on our high Customer Satisfaction scores and strong market presence. Red Sift appeared in 11 reports – 5 new ones since Spring 2024! – earning 5 badges: A few…

Read more
News

Google will no longer trust Entrust certificates from October 2024

Red Sift

Tl;dr: Google has announced that as of October 31, 2024, Chrome will no longer trust certificates signed by Entrust root certificates. While there is no immediate impact on existing certificates or those issued before 31st October 2024, organizations should start reviewing their estate now. On Thursday 27th June 2024, Google announced that it had…

Read more