HowTo

Risiko-Kebocoran-Data-dan-Bagaimana-Cara-Mengatasi-Masalahnya
Article

Data Leak Risks and How to Fix the Problem

What is a data leak? A data leak is the overlooked exposure of sensitive data. Exposure to this data can be physical, such as a logbook containing login information being accessed by an unauthorized person. Or,...

Serangan-Phishing-Media-Sosial-Bagaimana-Cara-Menghindarinya
Article

Social Media Phishing Attacks: How to Avoid Them?

Posting daily life, sharing information, and buying and selling can be done on many social media platforms. On the other hand, social media has become a new avenue for criminals to commit their crimes. If ten y...

Cegah-Serangan-Cyber-dengan-Memperkuat-Keamanan-Cloud-Computing
Article

Prevent Cyber Attacks by Strengthening Cloud Computing Security

Cloud Computing opens up the possibility for companies to invest less money in servers. Hybrid architecture allows companies to expand scalability and increase service portability. Cloud Computing technology ca...

Cara-Mencegah-Serangan-Cyber-dengan-Social-Engineering
Article

How to Prevent Cyber Attacks with Social Engineering

Definition of Social Engineering Social Engineering is the art of manipulating, influencing, or tricking a victim to gain control of the victim’s computer system. The human tendency to trust is exploited ...

Serangan-Cyber-Jaringan-IoT-Risiko-dan-Cara-Mengatasi
Article

IoT Network Cyberattacks: Risks and How to Overcome

Definition of Internet of Things (IoT) The term IoT refers to a network of “smart” devices that connect and share data with other devices and systems over the internet. IoT-compatible devices genera...

Keamanan-Perangkat-Mobile-Tips-Menghindari-Serangan-Cyber
Article

Mobile Device Security: Tips for Avoiding Cyber Attacks

Mobile devices make it easier for people to connect, communicate, and get work done. On the other hand, they also store tons of personal information. This information is vulnerable to falling into the wrong han...

Apa-itu-Cyber-Espionage-dan-Cara-Menghindarinya
Article

What is Cyber Espionage and How to Avoid It?

Definition of Cyber Espionage Cyber Espionage is a type of cyberattack that hackers carry out against businesses or governments. The goal is to spy on the victim to obtain information that can be sold to a riva...

Melindungi-Bisnis-dari-Serangan-Malware-Memilih-Antivirus-Tepat
Article

Protecting Businesses from Malware Attacks: Choosing the Right Antivirus

Malware and virus attacks are still a scourge for companies. They can shut down businesses due to corrupted data or damaged devices. What’s more, compromised devices allow hackers to steal important infor...

Mengenal-dan-Mencegah-Serangan-Brute-Force
Article

Recognizing and Preventing Brute-Force Attacks

What is a brute-force attack When performing a brute-force attack, hackers guess user information such as usernames and passwords to access private systems. Hackers perform trial-and-error until they guess the ...

Cara-Mendeteksi-dan-Mengatasi-Serangan-Cyber-pada-Sistem-IT
Article

How to Detect, Counter Cyber Attacks on IT Systems

As a business, you need to be responsive to react when there is suspicious activity on your network. In fact, a 2016 report from Cisco states that the average company detects a threat around 100-200 business da...

icon