now browsing by tag


#sextrafficking | Covid-19 has increased children’s exposure to traffickers | #tinder | #pof | #match | romancescams | #scams

Source: National Cyber Security – Produced By Gregory Evans

Crime & Justice, Health, Human Rights

Families, communities and policymakers must now work in tandem to eliminate this life-scarring menace

Jun 11 2020 – With Covid-19 bringing economic activities across nations to a halt, more and more people are being pushed into poverty. Job losses, business losses and farming losses, leading to economic stress, are pushing many to the fringes of poverty. And as families are being rendered helpless, the worst sufferers are invariably the children.

“46 percent children suffer from multidimensional poverty,” suggests a report shared recently by Bangladesh Sangbad Sangstha (BSS). And in the face of the growing economic hardships of the people, triggered by Covid-19, the number is likely to shoot up in the coming months.

From increased threats of modern slavery—domestic servitude, sex trafficking, and forced labour, such as begging—and reduced access to nutrition, basic healthcare facilities and education, to increased risk of emotional abuse and mental trauma, children today, especially the ones born into poverty, are at greater risk of exploitation.

According to Unicef, “The economic fallout of the Covid-19 pandemic could push up to 86 million more children into household poverty by the end of 2020.”

Save the Children and Unicef suggest that, “Immediate loss of income means families are less able to afford the basics, including food and water, less likely to access health care or education, and more at risk of child marriage, violence, exploitation and abuse. When fiscal contraction occurs, the reach and quality of the services families depend on can also be diminished.”

And with more and more people becoming jobless, chances of families abandoning their children, or using them to earn money is increasing by the day. According to a United Nations Office on Drugs and Crime (UNODC) report, “due to the pandemic, more children are being forced onto the streets to search for food and money, thus increasing their risk of exploitation.”

And more concerning are the lurking threats of the different ways in which children, in the wake of Covid-19 are being forced into sexual exploitation. For one, families in this part of the world, unable to feed “extra mouths”, often marry off their girls at an early age. Sometimes even in exchange for money. These little girls are subjected to marital rape by their husbands, and more often than not, suffer severe reproductive health damages due to the burden of early motherhood.

And if the girls are not so lucky, they are sold to traffickers by their husbands for money. Sometimes, in fact, predators marry young girls to be able to sell them for good money into sex slavery. While writing a detailed piece on this issue last year, I found that at times of desperation, the families themselves sell girls into prostitution. There have been cases where young sex workers had claimed that they had been sold to dalals by their own mothers.

Young boys face a different kind of fate. They are sent away to work in the informal sector to earn money for their families. And some of these young boys are preyed upon by predators for trafficking as slaves and sometimes into male prostitution.

According to a 2014 report by The Scelles Foundation, 42 million worldwide were involved in sex slavery. Of them, about eight million were men—it is not just women who are at the risk of being trafficked into sexual slavery. Male prostitution remains a less discussed issue, which is why when referring to sex slavery, the dialogues mostly centre around girls. But young boys do get raped and the possibility of them being forced into prostitution cannot be ignored.

And the children who have been sent out of the house to earn their living as beggars live with the constant threat of being exploited by their ring leaders. These girls and boys are not only taken advantage of by their employers but are also at times abused by the people giving them alms. I was once horrified when I saw a driver holding on to a semi-clothed girl’s hand while giving her alms. The girl—not knowing that it is not right for someone to touch her without her permission—was just happy that she got a note! Next time on the road, take a careful look, and the abuse of these children will become apparent.

But with Covid-19, you would think the demand for prostitution would have taken a hit, but you’d be wrong. The risk remains: according to Mama Fatima Singhateh, Special Rapporteur on the sale and sexual exploitation of children, appointed by the UN Human Rights Council in Geneva, the Covid-19 lockdown has resulted in people finding newer ways of availing prostitution services—through “delivery” or “drive-through”. According to Singhateh, people’s tendency to access illegal websites featuring child pornography has also increased— “Producing and accessing child sexual abuse material and live-stream child sexual abuse online has now become an easy alternative to groom and lure children into sexual activities and to trade images in online communities.”

A report published by the Council on Foreign Relations echoes the same fear— “While the current drop in global demand might temporarily disrupt exploitative circumstances, this effect is likely short-lived and eclipsed by increased vulnerability. Within sex trafficking, for example, the demand for commercial sex has dropped due to social distancing regulations. However, there is evidence that online sexual exploitation of children is on the rise, indicating that perpetrators are adapting in response to the environment.”

And this brings into the picture a new set of prey: children from middle-income to higher-income families who have access to the internet. These children, for whom the internet is the only means of staying connected with their friends and teachers, are at risk of being preyed upon by malicious traffickers.

And stuck at home, detached from the life they used to live, these children—according to Kazi Amdadul Hoque, Director-Strategic Planning and Head of Climate Action, Friendship, an international NGO—face a different kind of trauma. The fear of uncertainty, the fear of contagion and the depression from the lack of access to friends and outdoor activities make these children especially vulnerable to predators.

Child psychologist Tarana Anis suggests that now more than ever, parents and families have to be vigilant about the kind of online content their children are being exposed to, who their children are interacting with online, and which website they are accessing frequently. She suggests that families should engage in more shared activities and open discussions about current issues with their children.

This is certainly one way of tackling this problem. But we must keep in mind that the threat of physically trafficking children and selling them into prostitution or forced labour remains. Maybe there has been a decline in demand now, but it is only temporary. With the state’s resources already stretched fighting Covid-19, the government will find it difficult to fight off these other diseases, but this one definitely needs attention.

The government, along with bringing the poor under social safety schemes, must also mobilise the law enforcement agencies to strictly monitor the trafficking situation in the country. And families should spend more time with children and educate them about the risks that they might face online. The communities must look out for each, support each other and report suspicious activities. It is time we start looking out for ourselves, our loved ones and our communities, and report the wrongs to the concerned authorities, for the greater good of our children.

Tasneem Tayeb is a columnist for The Daily Star.
Her Twitter handle is: @TayebTasneem

This story was originally published by The Daily Star, Bangladesh


.  .  .  .  .  .  . .  .  .  .  .  .  .  .  .  .   .   .   .    .    .   .   .   .   .   .  .   .   .   .  .  .   .  .

Source link

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

The post #sextrafficking | Covid-19 has increased children’s exposure to traffickers | #tinder | #pof | #match | romancescams | #scams appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberdegense | #computerhacking | GDPR Working from Home Checklist in The Light Of COVID-19 – | #cybersecurity | #informationsecurity

Source: National Cyber Security – Produced By Gregory Evans

Working from home in this pandemic period? Check some risk associated with it and Follow this step by step checklist that organizations need to take…

By Susan Alexandra, Contributing Writer

EU General Data Protection Regulation (GDPR) imposes strict checks and balances for any mishandling or accidental leakage of personal data. Companies and businesses have to take some mandatory measures to maintain GDPR compliance. The responsibility of the organizations for protecting data turns multifold in the current situation of work from home.

Risks of Working from Home

COVID-19 has forced the corporate industry to opt for remote working in place of an office setting. This has increased the risk of a data breach. The major causes of this increase in risk are:

  • Work from home means that several devices are connected to the company’s database. This increases the chances of data theft and leakage.
  • The flow of data to and fro the company’s system is carried out through multiple networks with varying security levels. This eases the work of predators and cybercriminals.
  • Most of the employees working in a traditional setting are not familiar with the usage of online tools. This increases the chances of human error and the mishandling of data.
  • Unprotected devices are always an easy target for phishing emails and malware. Just one risky device or a single random click by any employee can risk the whole system.

Checklist for GDPR Compliance

Here are some necessary measures that your company or organization must take, especially in this current situation of remote working, to maintain their compliance with GDPR.

  • The company must update its privacy policy for employees working from home.
  • New agreements must be made with third parties and outside vendors to maintain compliance with GDPR.
  • All the employees should be provided with secured devices by the company.
  • If employees are using their own devices, they must be well protected with an up to date version of antimalware and firewall.
  • The encrypted network is a must for data security. Therefore, the company should provide VPN protected Wi-Fi devices to all the employees working from home.
  • If the employees are using their own Wi-Fi, they must be restricted to use password-protected Wi-Fi only. They must avoid using shared or public Wi-Fi for accessing and sharing the company’s data.
  • Limit access to important files and data.
  • Two-factor authentication must be used for allowing access to the company’s database.
  • All the tools and software used for communicating and data transfer must be encrypted.
  • Employees must be asked to limit their online activities on the devices that are used for accessing the company’s database.
  • Employees must be restricted from sharing any details and passwords with unauthorized people. The company’s data should not be shared with anyone, not even with the family members.
  • Employees must be trained for the usage of online tools and software to decrease the chances of human error.
  • Employees must also be educated about online safety and how to stay safe from phishing emails and invading malware.
  • Companies should have a proper IT infrastructure to monitor remote devices connected with their system.
  • Notifications must be set to get an alert in case of any security risk from any device connected with the system. This device should be immediately removed from the system and denied access for the time being.
  • Companies must have taken Data Processing Impact Assessment (DPIA) to detect any issue in the security system.
  • If there are any loopholes in security, they must be dealt with on an urgent basis.
  • Companies must have prepared an alternate plan in case of a data breach.
  • Employees must also be trained to urgently deal with any security issue at their end.

These are some crucial steps that every organization must take to maintain GDPR compliance and avoid any fines by GDPR. According to a report by PrivacyAffairs, “the total number of GDPR fines are 256 yet”.

Maintaining GDPR compliance has become challenging for organizations in this work from home situation. GDPR is detecting more data breaches than ever and is actively imposing fines on the companies not following a proper data security regime. The time demands companies to be extra vigilant about their data security. They must revise their policies and devise new strategies for safer handling and storage of confidential and crucial data.

About the Author

Susan Alexandra Author

Susan Alexandra is an independent contributing author at SecurityToday and Tripwire. She is a small business owner, traveler, and investor in cryptocurrencies.

Source link


Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.

Source link
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

The post #cyberdegense | #computerhacking | GDPR Working from Home Checklist in The Light Of COVID-19 – | #cybersecurity | #informationsecurity appeared first on National Cyber Security.

View full post on National Cyber Security

#mobilesecurity | #android | #iphone | Israel to cease using mobile phone tracking to monitor Covid-19 patients | #cybersecurity | #informationsecurity

Source: National Cyber Security – Produced By Gregory Evans


The ministerial committee in charge of combating Covid-19 decided on Monday not to submit to a parliamentary vote a bill authorizing the continued use of phone surveillance technologies by the Israel Security Agency, also known as Shin Bet, to track suspected Covid-19 cases.   The bill is still…

The post #mobilesecurity | #android | #iphone | Israel to cease using mobile phone tracking to monitor Covid-19 patients appeared first on .


Source link
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

The post #mobilesecurity | #android | #iphone | Israel to cease using mobile phone tracking to monitor Covid-19 patients | #cybersecurity | #informationsecurity appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | Rimbey RCMP warn public scams related to COVID-19 cropping up – Stettler Independent

Source: National Cyber Security – Produced By Gregory Evans

Rimbey RCMP are warning residents of scams using the COVID-19 outbreak as a cover.

Scams associated with the global pandemic have been cropping up, feeding on people’s fear, uncertainty and misinformation during a difficult time.

“Fraudsters are exploiting the crisis to facilitate fraud and cyber-crime,” Rimbey RCMP said in a press release.

Scammers are using many different means to attempt to exploit innocent victims.

There have been a number of reported scams concerning COVID-19.

These scams include door-to-door sales people, and people posing as an official from the Red Cross.

RCMP say they following scams that have been reported:Cleaning or heating companies – offering duct cleaning services or air filters to protect from COVID-19

Local and provincial hydro/electrical power companies – threatening to disconnect your power for non-payment

Centers for Disease Control and Prevention or the World Health Organization – offering fake lists for sale of COVID-19 infected people in your neighbourhood

Public Health Agency of Canada – giving false results saying you have been tested positive for COVID-19, tricking you into confirming your health card and credit card numbers for a prescription

Red Cross and other known charities – offering free medical products (e.g. masks) for a donation

Government departments – sending out coronavirus-themed phishing emails, tricking you into opening malicious attachments, tricking you to reveal sensitive personal and financial details

Financial advisors – pressuring people to invest in hot new stocks related to the disease, offering financial aid and/or loans to help you get through the shut downs

Door-to-door sales people – selling household decontamination services

Private companies – offering fast COVID-19 tests for sale – Only hospitals can perform the test. No other tests are genuine or guaranteed to provide accurate results and the selling fraudulent products that claim to treat or prevent the disease threaten public health and violate federal laws

RCMP are reminding residents to be mindful and award of the following:Spoofed government, healthcare or research information

Unsolicited calls, emails and texts giving medical advice or requesting urgent action or payment

Unauthorized or fraudulent charities requesting money for victims, products or research

High-priced or low-quality products purchased in bulk by consumers and resold for profit. These items may be expired and/or dangerous to your health

Questionable offers, such as: miracle cures, herbal remedies, vaccinations, faster testing

Fake and deceptive online ads, including: cleaning products, hand sanitizers, other items in high demand

It is important to remember where to find trusted information and advice about COVID-19.

For the latest updates on health information look to the Public Health Agency of Canada and the World Health Organization, RCMP say.

Any questions or concerns about any health insurance should be directed to your insurance provider.

RCMP also recommend having anti-virus software install on your devices to protect from suspicious email or ads online.


Get local stories you won’t find anywhere else right to your inbox.
Sign up here

Source link

The post #cyberfraud | #cybercriminals | Rimbey RCMP warn public scams related to COVID-19 cropping up – Stettler Independent appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | hacker | VPNs: Not a cybersecurity slam dunk for telecommuters in the age of COVID-19

Source: National Cyber Security – Produced By Gregory Evans

CISOs and cybersecurity teams around the world are watching their threat surface multiply as millions of staffers find themselves working from home for the first time in order to help constrain the spread of Coronavirus.

The removal of these people from the safe and controlled working environment found in their offices and tossing them into the wild, so to speak, means a greater dependence on VPNs, which may prove problematical as most large enterprises are not prepared to host the majority of their workforce online, and smaller companies may not be set up at all for this type of access.

Then there is the additional threat posed by workers operating outside the direct oversight of IT and security teams possibly making catastrophic decisions that could endanger the entire organization.

Stan Lowe, global CISO for Zscaler, noted that most businesses have enough VPN hardware to generally handle between 20 percent and 30 percent of their workforce working remotely. However, now that entire corporations have been forced to send their employees home with their laptops this is proving not to be anywhere near enough.

It is also no simple nor inexpensive matter to go out and purchase additional equipment, at least the type needed by larger firms that require a high degree of security, Lowe said. Zscaler is a provider of a cloud-based, remote access software.

“If you need more equipment, it takes time—you have to buy it, wait for it to ship and arrive then deploy it, update the hardware and keep it updated. And that’s just the VPN stack. Trying to scale VPNs and other legacy remote access technology, adding tens of thousands of users, can take months and break a corporate network,” he said, adding three to five months is a good guesstimate for such an upgrade.

For those companies that cannot increase their VPN capacity it might become necessary to put their workers onto shifts so the VPN capability that is on hand is spread out, Lowe said.

Even companies well-equipped to handle an influx in VPN usage face the daunting task of bringing those who normally occupy office space up to speed on how to use their VPN and make sure their home network can handle the added bandwidth.

“IT must be sure to educate their users, so they are aware of the impact on everyone and to limit their bandwidth-heavy activity, like Netflix streaming, to outside of office hours. This will ensure that productivity doesn’t drop and that users don’t try to forgo the VPN altogether, which could have dire consequences for the security of the business,” said Justin Jett, director of audit and compliance for Plixer.

Another unique situation that needs to be addressed, Jett said, is that not only are employees at home, but so is the rest of their family. A person attempting to do work at the kitchen table is competing with their spouse who is working from the den and their kids who may be gaming or streaming video in another room. All of these demands need to be balanced so work can get done, perhaps requiring the kiddies to limit themselves to board games during the day and steaming when office hours are over.

Then there is the cybersecurity aspect of this new reality. Using a VPN does not by itself make working from home more secure. Lowe pointed out that with people linking in from all over the world, possibly through an insecure router, a company’s attack surface is vastly increased. Even those with a safe connection can cause problems as cybercriminals are working overtime right now to come up with new phishing lures designed to grab login credentials from all the individuals who are now telecommuting full time.

“A VPN only secures the communication channel between the employee’s workstation and the corporate network. However, as a massive amount of home workers now start to use their personal workstations to access corporate assets, it’s only a matter of time until we see a soaring number of cyberattacks that originate from these personal devices that can be easily breached,” said Tal Zamir, co-founder and CTO of Hysolate.

If just one person makes a mistake a malicious actor could gain the information needed to access a corporate network. Placing even more pressure on the individual is the fact that there is nobody from the company’s IT department or security team within earshot to ask if an email is malicious or legit.

“If devices are infected with malware, even workers who use a VPN client cannot evade attackers who can ride their VPN connection to raise havoc in enterprise networks. The more users are working from home, the greater the risk. Organizations should instruct employees to use trusted dedicated workstations to access sensitive corporate assets and avoid using their multi-purpose personal devices,” Tamir said.

A VPN breach is about as bad as you can get, the ability for someone to travel internally from VPN infrastructure into sensitive data is extremely easy, said Aaron Zander, Head of IT at HackerOne.

Companies able to add VPN capacity are not safe but must takes several extra measures to ensure errors are not made in their haste to deploy the new hardware.

“Triple check all of your network configurations, ACL’s, firewall rules, etc. Without a doubt in 9 months from now, we’ll be looking at news stories about two impacts resulting from COVID-19 — all the babies being born, and all the breaches that have happened because of negligent infrastructure,” Zader said.

Original Source link

The post #cybersecurity | hacker | VPNs: Not a cybersecurity slam dunk for telecommuters in the age of COVID-19 appeared first on National Cyber Security.

View full post on National Cyber Security

#infosec | UK Spies Hunt Down Covid-19 Threats

Source: National Cyber Security – Produced By Gregory Evans

The UK’s National Cyber Security Centre (NCSC) has stepped in to remove malicious and phishing websites linked to Covid-19 scams, but warned that attacks could increase if the outbreak does.

The GCHQ body said that phishing efforts using the Coronavirus as a lure have led to victims losing money and sensitive data across Europe.

It urged businesses and consumers to consult its advice on email scams and dealing with malware to better insulate them from the threat of ransomware, credential theft and fraud.

“The NCSC has seen an increase in the registration of web pages relating to the Coronavirus suggesting that cyber-criminals are likely to be taking advantage of the outbreak,” it said.

“Continued global susceptibility to phishing will probably make this approach a persistent and attractive technique for cyber-criminals. Moreover, if the outbreak intensifies, it is highly likely that the volume of such attacks will rise.”

Security vendors have been sounding the alarm over phishing attacks for more than a month. Emails are often spoofed to appear as if sent from the World Health Organisation (WHO), the US Center for Disease Control (CDC) or other official bodies, and claim to contain new information on the outbreak in an attachment or via a link.

Some are laden with malware while others request the user enter their email and password, Outlook log-ins or other credentials to proceed. There are also reports, cited by the NCSC, of fraudsters requesting Bitcoin donations to fund a fake vaccine, and even scam sites selling fake antiviral equipment.

“We know that cyber-criminals are opportunistic and will look to exploit people’s fears, and this has undoubtedly been the case with the Coronavirus outbreak,” said NCSC director of operations, Paul Chichester.

“Our advice to the public is to follow our guidance, which includes everything from password advice to spotting suspect emails. In the event that someone does fall victim to a phishing attempt, they should look to report this to Action Fraud as soon as possible.”


#infosec #itsecurity #hacking #hacker #computerhacker #blackhat #ceh #ransomeware #maleware #ncs #nationalcybersecurityuniversity #defcon #ceh #cissp #computers #cybercrime #cybercrimes #technology #jobs #itjobs #gregorydevans #ncs #ncsv #certifiedcybercrimeconsultant #privateinvestigators #hackerspace #nationalcybersecurityawarenessmonth #hak5 #nsa #computersecurity #deepweb #nsa #cia #internationalcybersecurity #internationalcybersecurityconference #iossecurity #androidsecurity #macsecurity #windowssecurity

Source link

The post #infosec | UK Spies Hunt Down Covid-19 Threats appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | Apple’s COVID-19 Response – Apple

Source: National Cyber Security – Produced By Gregory Evans

In Our Offices and Stores

First, I want to recognize Apple’s family in Greater China. Though the rate of infections has dramatically declined, we know COVID-19’s effects are still being strongly felt. I want to express my deep gratitude to our team in China for their determination and spirit. As of today, all of our stores in Greater China have reopened. I also want to thank our operations team and partners for their remarkable efforts to restore our supply chain. What we’ve learned together has helped us all develop the best practices that are assisting enormously in our global response.

One of those lessons is that the most effective way to minimize risk of the virus’s transmission is to reduce density and maximize social distance. As rates of new infections continue to grow in other places, we’re taking additional steps to protect our team members and customers.

We will be closing all of our retail stores outside of Greater China until March 27. We are committed to providing exceptional service to our customers. Our online stores are open at, or you can download the Apple Store app on the App Store. For service and support, customers can visit I want to thank our extraordinary Retail teams for their dedication to enriching our customers’ lives. We are all so grateful to you.

In all of our offices, we are moving to flexible work arrangements worldwide outside of Greater China. That means team members should work remotely if their job allows, and those whose work requires them to be on site should follow guidance to maximize interpersonal space. Extensive, deep cleaning will continue at all sites. In all our offices, we are rolling out new health screenings and temperature checks.

All of our hourly workers will continue to receive pay in alignment with business as usual operations. We have expanded our leave policies to accommodate personal or family health circumstances created by COVID-19 — including recovering from an illness, caring for a sick loved one, mandatory quarantining, or childcare challenges due to school closures.

Source link

The post #deepweb | <p> Apple’s COVID-19 Response – Apple <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | Alert Logic COVID-19 Preparedness and Response

Source: National Cyber Security – Produced By Gregory Evans

To the Alert Logic customer and partner community,

With the global coronavirus (COVID-19) situation continuing to develop, Alert Logic is actively taking steps to safeguard the health of our employees and mitigate the spread of the virus in all the communities we are members of, while ensuring the continuity of our operations and maintaining consistently high levels of service to you.

As a worldwide organization that is entrusted to deliver an essential service 24/7, we are well prepared for the unexpected. In addition to our standard business continuity plans, we began reviewing and implementing specific provisions shortly after the COVID-19 outbreak occurred in China. While there continue to be unknowns, we are here and we are ready.

To support our employees in their well-being, we are asking them to work from home and refrain from all non-essential travel. Operating remotely is business-as-usual for our global team. We have voice and video systems in place and have encouraged their use for most customer and business partner meetings. In addition to operational enablement of our remote workforce we maintain the security controls and access management to support continuous monitoring and compliance.

Your day-to-day interaction with Alert Logic will remain unchanged. Our security operations are designed for continuous availability, operating across multiple geographic locations and capable of shifting resources and workflow as needed. Our online systems are built for extreme scale and are expected to operate without disruption. They will continue to be monitored and supported by the Alert Logic engineering and operations teams.

We will remain vigilant as this situation evolves, and continue to adjust our operations as needed. We are confident in our ability to uphold our commitments to your business and trust during this challenging time, and will maintain an open line of communication with the extended Alert Logic community throughout. We appreciate your continued trust and partnership as we navigate through this situation.

Best regards,

Bob Lyons, President and CEO
Alert Logic, Inc.

About the Author

Bob Lyons

As Chief Executive Officer, Bob Lyons brings Alert Logic more than 25 years of experience as a global executive with a demonstrated track record of value creation through technology innovation, revenue growth, customer experience and operational excellence. He is recognized for his success in helping high-growth technology and Software-as-a-Service companies scale globally and innovate, most recently as President and Chief Operating Officer of Connexions, a global leader in SaaS based customer loyalty and engagement solutions. Previously he served as Executive Vice President, Technology and Operations at Ascend Learning, a leading educational content and SaaS company. At Alert Logic, Lyons will support the company’s continued leadership and growth in security and compliance solutions for today’s diverse technology environments.

More Posts by Bob Lyons

Source link

The post #cybersecurity | #hackerspace |<p> Alert Logic COVID-19 Preparedness and Response <p> appeared first on National Cyber Security.

View full post on National Cyber Security