Understanding the difference between digital and e-signatures

The terms digital signature and e-signature are often used interchangeably, but they are two unique solutions. In this blog, we’ll take a closer look at these two options and explain how they differ and some of the benefits that they offer. Read on to learn more. Definition of an e-Signature E-signatures enable a user to […]

Read More… from Understanding the difference between digital and e-signatures

Why do enterprises need secure collaboration platforms more than ever?

Collaborating is an important business process for most firms operating today. From sharing important documents with customers and partners to employees working as a team both inhouse and off-site, collaboration can be both external and internal. However, to ensure that information is exchanged safely and never put at risk, a secure platform is a vital […]

Read More… from Why do enterprises need secure collaboration platforms more than ever?

WeTransfer abused by threat actors

Recent reports show that the infamous Lampion malware is being distributed much more frequently lately, with cybercriminals abusing WeTransfer as an integral element of their insidious phishing campaigns. A legitimate service designed for file sharing, WeTransfer can be used entirely free of charge. As a result, it offers a zero-cost option to bypass security software […]

Read More… from WeTransfer abused by threat actors

How much does email encryption cost?

To keep competitive, most successful firms are constantly seeking out ways to improve their bottom line. However, there are some areas that enterprises are advised never to skimp on. Cyber security should remain a top priority for businesses, as attempting to spend less on protective measures can result in greater expenses later. […]

Read More… from How much does email encryption cost?

New cybercriminal service offers all hackers access to advanced phishing tools

A reverse-proxy style phishing-as-a-service platform entitled EvilProxy has recently emerged, pledging the capability to steal authentication tokens that can get past multi-factor authentication on Apple, Facebook, Google, Microsoft, GitHub, Twitter and GoDaddy. The new service empowers low-skill level threat actors who cannot create reverse proxies with the ability to take over online accounts with extended […]

Read More… from New cybercriminal service offers all hackers access to advanced phishing tools

Best practices for secure file transfers

Sharing documents might be an easy process in the modern digital workplace thanks to the multitude of file-sharing software options available on today’s market. However, file sharing securely is another matter altogether. The rapid pace of modern business can sometimes put enterprise professionals under pressure. Unfortunately, this can lead them to foregoing important security practices […]

Read More… from Best practices for secure file transfers

How does backdoor malware work?

In terms of cybersecurity, the phrase backdoor refers to a wide range of methods by which unauthorised or authorised users can circumnavigate standard security measures to obtain high level user access (also known as root access) to a dedicated computer network, system or application. After they have gained access, a cybercriminal can use the backdoor […]

Read More… from How does backdoor malware work?

Five phishing attacks UK firms are facing in 2022

Phishing attacks are launched against enterprises by threat actors to achieve a specific outcome, typically involving economic gain. Attacks are designed to create a sense of urgency or panic in the user and trick them into acting in a way that is detrimental to either themselves or the company they work for. […]

Read More… from Five phishing attacks UK firms are facing in 2022

Three reasons why ransomware attackers target the education sector

Multiple warnings have been issued this year from the UK government outlining the growing threat of ransomware to organisations and educational facilities across the country. In this blog, we’ll take a closer look at why schools, colleges and universities here in Britain are becoming such a favoured victim of ransomware groups. […]

Read More… from Three reasons why ransomware attackers target the education sector

International library services company struck by ransomware attack

Self-described as the largest distribution firm issuing books to libraries in the world, North Carolina-based enterprise Baker & Taylor was recently hit by a ransomware attack. In business for almost two centuries now, the well-established company supplies to schools as well as libraries of both an academic and public nature across the globe. A recent […]

Read More… from International library services company struck by ransomware attack