Three staff-related cybersecurity issues to consider

From IT security admins to Chief Information Officers (CIOs), those charged with data security for enterprises understand that the human element of a firm is often the weakest link in the cybersecurity chain. While technical tools from antiviruses to firewalls can help, a lack of understanding regarding cybersecurity risks, poor practices, and an inability to […]

Read More… from Three staff-related cybersecurity issues to consider

Understanding encryption and GDPR

The General Data Protection Regulation’s (GDPR) security principles demand that firms use appropriate organisational and technical measures to ensure personal data is processed safely. In the following sections, we’ll explore encryption as a security solution for data protection. What is the purpose of encryption? Encryption is technically a mathematical function that can encode data in […]

Read More… from Understanding encryption and GDPR

Galaxkey wins UK Government funding to enable children to communicate safely online

16/11/21: Galaxkey, the cybersecurity platform known for its innovative approach to protecting sensitive data simply and effectively, has won funding to develop a platform that will enable children to communicate safely online – without risk of sexual exploitation. It will develop the platform with its trusted technology partners Yoti and Image Analyzer. The funding has […]

Read More… from Galaxkey wins UK Government funding to enable children to communicate safely online

What are the different types of email security?

Emails and the account they are sent from contain a wealth of sensitive data. If a hacker obtains access to them, the result can be catastrophic for companies with considerable data breach on their hands. Email is also a favoured attack vector for threat actors, who launch schemes and scams at companies through this commonly […]

Read More… from What are the different types of email security?

State hackers hit organisations in critical sectors

Cybersecurity experts at Palo Alto Networks recently issued warnings about an insidious hacking campaign. The continuing cybercriminal initiative has already compromised at least nine different organisations around the world operating in critical sectors, including technology, defence, energy, healthcare, and education. Anatomy of a cyberespionage campaign To breach the organisation’s networks, the threat operators behind this […]

Read More… from State hackers hit organisations in critical sectors