Soteria Cyber (@soteriacyber) 's Twitter Profile
Soteria Cyber

@soteriacyber

Soteria are the UK’s only company concentrating solely on Cyber Security for SAP® products; that’s all we do.

ID: 3092772189

linkhttp://www.soteriacyber.com calendar_today17-03-2015 16:39:58

441 Tweet

76 Followers

135 Following

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/NnoN30oQXpF Once hackers are logged in, they can create additional backdoors. The company initially offered a fix for its paid offering, but not a patch for users of the free version of Slick Popup. #CyberSecurity Soteria Cyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/2o6930oTA5W While threats and vulnerabilities are virtually infinite, access is finite, measurable, and most of all provable. Therefore, by controlling access, security can be proven. #CyberSecurity Soteria Cyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/hUb530oVEcb bbc.co.uk/news/technolog… not hard to get into corporate networks, the most successful method of winning access can be via a well-crafted phishing campaign. #CyberSecurity Soteria Cyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/aa2T30p0Bhk 62 per cent of people are unaware that social media companies make money by selling data to third parties. #CyberSecurity #DataPrivacy Soteria Cyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/rir330pmtLn Denial of service via GDPR is an unintended consequence. "You can imagine a worse version of this attack, where I told companies to delete accounts, and what impact that might have had on their digital life." Soteria Cyber#DataPrivacy

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/RA7p30pzvFi Facial recognition technology involves the use of biometric data for the purposes of uniquely identifying individuals, which means it is special category personal data and subject to stricter rules under data protection law,#GDPR #DataPrivacy@SoteriaCyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/c28730pF68N Application security, possibly more than any other threat vector, remains healthcare’s greatest cyber-security weakness.#CyberSecurity@SoteriaCyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/sLiu30pJODM The EEA wouldn't want to green-light the free flow of personal data to the UK, if UK organisations could then freely send the data (without protection) to countries that the EU itself does not recognize as providing adequate protection. #GDPR@SoteriaCyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/z8r650x5zNw The CISO was attacked for having a music degree even though this was 30 years ago when cyber-security wasn't a known concept. There was a disproportionate personal impact to some of those people who were singled out #CyberSecurity Soteria Cyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/tMb630pYVhz The structural advantage is on the side of forgers. Whilst the good guys need huge numbers of deepfake videos to train on, forgers might only need one video in the right place at the right time to achieve their goal.#CyberSecurity@SoteriaCyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/Xwkd30qduxn Simply by knowing the phone number associated with one of the devices, attackers could take control of them remotely in order to track a child wearing it through the inbuilt GPS function.Soteria Cyber#CyberSecurity

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/GGW730qnG2M The ICO said Cathay Pacific became aware of a problem in March 2018, when it suffered a "brute force" password-guessing attack. #GDPR Soteria Cyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/9Sbq30qpgW0 The database, which was for marketing purposes, contained phone numbers, home and email addresses. #CyberSecurity Soteria Cyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/SI9e30qwP5d Locking down the supply chain. Most security teams worry about the security of supply chains – with good reason. Third parties have been the entry point for hackers into larger, more data rich companies. #CyberSecurity #GDPR@SoteriaCyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/EJMG30qEeKo Cyber-criminals could target healthcare providers, knowing they may be even more willing than usual to pay a ransom for the return of their data. #CyberSecurity Soteria Cyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/zOaz30qIniC The Israeli firm is already locked in a legal battle with Facebook, which alleges it deliberately spread its software over WhatsApp, compromising hundreds of phones - including those of journalists and human rights activists. #CyberSecurity Soteria Cyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/qPxI30qO5rN With remote working, remote access and rocketing adoption of voice and video services, business networks and security infrastructure have been placed under unprecedented pressure as a consequence of COVID19. #CyberSecurity@SoteriaCyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/2l4Y30r32QD Travelex was held to ransom by hackers in January after the cyber-attack forced it to turn off its systems. #CyberSecurity@SoteriaCyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/f63X30r85D6 "You can follow the route of your kid for the last 30 minutes, 60 minutes, etc, through recording and playback of movements."#CyberSecurity@SoteriaCyber

Soteria Cyber (@soteriacyber) 's Twitter Profile Photo

ow.ly/4SJU30rcJmr While we tend to focus on the malware/ransomware itself, the best way to avoid becoming a victim is to prevent the infection in the first place.#CyberSecurity@SoteriaCyber