Why are DLP protocols vital for enterprise email?

DLP or Data Loss Prevention is recognised as one of the most potent tools companies can deploy to protect themselves and the information they handle from a breach. In many scenarios, the data held on file by firms is incredibly sensitive or includes private details about customers, clients, suppliers and vendors which is regarded as […]

Read More… from Why are DLP protocols vital for enterprise email?

Phishing Attacks: Stay informed and act to mitigate their threat

The definition of a phishing attack is: “A fraudulent attempt by threat operators to get their hands on confidential data. The data can be enterprise or personal information that is retained on clients, customers and personnel”. This private data may involve credentials like usernames and passwords required to access company accounts and business networks. It […]

Read More… from Phishing Attacks: Stay informed and act to mitigate their threat

Texas cloud provider faces lawsuits following ransomware attack

Two fresh lawsuits were recently filed against the Texas-based cloud enterprise Rackspace after it disclosed that it was hit by a targeted ransomware attack. Wherever your business is based, ransomware attacks can be exceptionally damaging. Lawsuits from data subjects whose personal information is exposed and fines from data regulators can add up to millions. However, […]

Read More… from Texas cloud provider faces lawsuits following ransomware attack

Uber data leaked online after attack on third-party vendor

Uber Technologies recently suffered a brand-new data breach after a malicious actor leaked the email addresses of its employee, IT asset information and corporate reports. The compromised data was originally stolen in a cyberattack from a third-party vendor connected to Uber. It is vital for all enterprises and organisations to ensure that any other firms […]

Read More… from Uber data leaked online after attack on third-party vendor

Australian telecoms provider, Telstra, apologises for data breach

Australian telecommunications company Telstra recently publicly apologised for a massive data breach. The large-scale incident resulted in the personal details of over 130,000 of the company’s customers becoming exposed contrary to their wishes. The data breach at Telstra is the latest incident of such scale suffered by an enterprise in Australia. […]

Read More… from Australian telecoms provider, Telstra, apologises for data breach

Ransomware warning issued by US Health Department

The United States Department of Health and Human Services (HHS) recently issued a warning for the nation’s healthcare organisations regarding continuing attacks from a relatively new ransomware operation. The gang known as Royal Ransomware are yet another malicious actor deploying malicious crypto malware in attempts to cause chaos and gain profits. […]

Read More… from Ransomware warning issued by US Health Department

Enterprise email accounts employed to send RAT

Hackers recently used corporate emails to transmit an MSP remote administration tool (RAT) in a phishing operation. A RAT is a piece of software that gives a person full control of a device from a remote location. And according to experts, the infamous hacking outfit MuddyWater, a group connected with the Ministry of Intelligence and […]

Read More… from Enterprise email accounts employed to send RAT

Why should you keep an audit log when using electronic document signing?

When most businesses consider using electronic document signing, legality and security are typically their two key concerns. In fact, a signature added electronically is just as legal as a traditional wet ink signature and can actually be even more secure – thanks to an e-signature audit trail. […]

Read More… from Why should you keep an audit log when using electronic document signing?