What type of data are ransomware operators after?

Ransomware attacks have become so lucrative that many cybercriminals are changing their old ways in favour of this extortion-based cyberthreat. Ransomware gangs are not necessarily discerning when selecting their targets, and companies of all sizes and based in a wide range of sectors have become victims of attacks. This type of attack is typically successful […]

Read More… from What type of data are ransomware operators after?

Top tips for handling confidential information in your business

Handling sensitive data is an essential process for most companies in operation today. Common confidential information can include staff records and client profiles stuffed with personally identifiable information (PII), financial data files like invoices and agreements featuring company payment details and those belonging to customers and suppliers, and business contracts with other enterprises. […]

Read More… from Top tips for handling confidential information in your business

Cybersecurity tips when using remote teams

Though many workers across the country have begun returning to the office, the unplanned necessity of remote working over the pandemic has proved fruitful for others. Companies like Twitter, Coinbase, Vodaphone and Siemens have all seen impressive results from home and hybrid worker productivity and have continued to keep these options open to their employees. […]

Read More… from Cybersecurity tips when using remote teams

International taskforce takes out Russian botnet

A recent announcement by the USA’s Department of Justice has revealed that a malware botnet known as RSOCKS has been disrupted by a collaborative effort from law enforcement agencies from America and Europe. The RSOCKS botnet has been instrumental in the hijacking of millions of devices around the world, enslaving desktop computers, laptops and smartphones […]

Read More… from International taskforce takes out Russian botnet

How do you reduce the risk of enterprise email phishing attacks?

In the past, phishing emails were often considered a joke. Typically poorly written by threat actors based in non-English speaking nations, they were often difficult to understand and their attempts to coerce funds from recipients were so obvious that they were rarely deemed a threat. While fake company branding was sometimes used in emails, it […]

Read More… from How do you reduce the risk of enterprise email phishing attacks?

American not-for profit discloses data leak

The prominent US non-profit organisation Kaiser Permanente, which specialises in providing health care products and services, recently disclosed that it has suffered a data breach. The extensive leak involved the exposure of private health information belonging to nearly 70,000 different data subjects. Kaiser Permanente was originally founded in 1945, and currently provides a substantial range […]

Read More… from American not-for profit discloses data leak

Does your email encryption software have these key features?

Encryption is fast becoming an essential feature of every enterprise’s email security protocols. It can offer companies powerful protection to their correspondence with colleagues, contacts, customers and suppliers, making it an invaluable tool when sensitive data must be transmitted via email. Unfortunately, not every encryption option offers identical levels of security and usability. In this […]

Read More… from Does your email encryption software have these key features?