Ending Q1 2022 with a little bit of fun

Ending Q1 2022 with a little bit of fun
[et_pb_section fb_built=”1″ _builder_version=”4.9.2″ _module_preset=”default”][et_pb_row _builder_version=”4.9.2″ _module_preset=”default” custom_padding=”||0px|||”][et_pb_column _builder_version=”4.9.2″ _module_preset=”default” type=”4_4″][et_pb_text _builder_version=”4.9.2″ _module_preset=”default” hover_enabled=”0″ sticky_enabled=”0″ custom_margin=”||-102px|||”]

Earlier, Industry experts at Seceon collaboratively released (15) Cyber Security Predictions for 2022. Leveraging my industry experience I contributed to the predictions, the first of which I made was: “Some of the most sophisticated attacks in recent years appeared to part of a more strategic objective for threat actors. Like in 2021, critical infrastructure will likely be targeted.” February 26, 2022 the Cybersecurity & Infrastructure Security Agency, US-Cert for short, summarized Destructive Malware Targeting Organizations in Ukraine. Unfortunately, the successful execution of this new malware impacting the availability of critical assets and data meant the prediction I made was accurate. When thinking about this prediction before it became a reality, the Cyber Attack I feared was an event which negatively impacts humanity, specifically their wallets, but I never suspected the Cyber-attack would be part of a military invasion.

Nearing the end of Q1, 2022 weary Cyber Security Professionals, like me, were almost fully recovered from helping their organizations pivot away from the As a result of these new vulnerabilities and destructive Cyber events tension for Security Professionals couldn’t be higher at this moment. So, I’d really like to lighten the mood even if it’s just for the next 5 minutes.

If you’re in Cyber Security, I.T. or Technology I invite you to sit back, take a few deep breathes, try to relax, and enjoy the “Cyber Security” themed fun by going through the media below.

[note to Sukulpa: (1) Please ensure the list below is in order when you design the content, also (2) please remove this note]

 

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.9.2″ _module_preset=”default”][et_pb_row _builder_version=”4.9.2″ _module_preset=”default”][et_pb_column _builder_version=”4.9.2″ _module_preset=”default” type=”4_4″][et_pb_image src=”https://www.seceon.com/wp-content/uploads/2022/04/Data-Trap.jpg” _builder_version=”4.9.2″ _module_preset=”default” title_text=”Data Trap” align=”center” hover_enabled=”0″ sticky_enabled=”0″][/et_pb_image][et_pb_image src=”https://www.seceon.com/wp-content/uploads/2022/04/Information-Security.jpg” _builder_version=”4.9.2″ _module_preset=”default” title_text=”Information Security” align=”center” hover_enabled=”0″ sticky_enabled=”0″][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section]