Author: Szilvia Gagyi

Labyrinth Cyber > Articles by: Szilvia Gagyi

How Quickly Should a Data Breach Be Reported?

When it comes to data breaches, the saying "time is of the essence" takes on a critical significance. The speed at which a company reports a breach can significantly impact the severity of its consequences for both the organisation and…

Read More

Watch Out for QR Code Scams

A recent incident at Thornaby Station reveals a concerning trend in digital scams. A woman, 71, lost £13,000 to fraudsters who cleverly replaced a real QR code with a fake one in the station's car park. This act directed her…

Read More

What is Sensitive Data?

Nowadays, the term "sensitive data" has become increasingly prevalent in our vocabulary. But what exactly does it mean, and why should you care about it? Sensitive data refers to any information that, if exposed, could cause harm to individuals, organisations,…

Read More

What is Network Penetration Testing?

Network penetration testing, often referred to as network pen testing or ethical hacking, is a cyber security practice that involves assessing the security of computer networks, systems, and applications by simulating cyber attacks. The primary objective of network penetration testing…

Read More

Understanding the Maximum Fines for Data Breaches in the UK

Data protection and privacy have become paramount concerns for individuals and organisations alike. To ensure the safeguarding of personal information, governments have enacted stringent data protection regulations. In the United Kingdom, the maximum fines for data breaches serve as a…

Read More

What Is Vishing?

Vishing, short for voice phishing, is a type of cyber attack that involves using voice communication to trick individuals into revealing sensitive information or performing certain actions. Vishing attacks typically occur over the phone, but they can also happen through…

Read More

What is Ethical Hacking?

Ethical hacking, also known as white hat hacking, involves the deliberate attempt to identify vulnerabilities and weaknesses in computer systems, networks, applications, and other digital assets. Ethical hackers, often referred to as white hat hackers, are individuals or professionals who…

Read More

How to get Cyber Essentials Certified?

In a world where digital threats and cyber attacks are ever-present, safeguarding sensitive information and digital assets has become an imperative for organisations across the board. Being Cyber Essentials certified is not just a badge, but a powerful declaration of…

Read More

Privacy Concerns: Zoom Is Using Your Call Recordings for AI Training

A recent revelation has raised significant concerns about the use of private calls and messages to train artificial intelligence (AI) systems. The San Jose-based company Zoom, known for its popular video conferencing platform, has introduced new terms and conditions that…

Read More

The Synergy of AI and Cyber Security

AI (Artificial Intelligence) and cyber security are two rapidly evolving fields that have a profound impact on each other. As technology advances, so do the methods used by cyber criminals to exploit vulnerabilities and compromise sensitive information. AI Advancements in…

Read More