Two cybersecurity features every firm can benefit from

Companies seeking to stay at the forefront of their field, and local authorities and schools looking to protect the data they retain on members of the community and students, must look to the latest technology available for information security. […]

Read More… from Two cybersecurity features every firm can benefit from

What makes phishing emails so dangerous?

Often lumped together with simple spam, phishing emails have a reputation for being poorly fashioned attacks that are easy for anyone to spot. The truth is that phishing has come a long way since its early inception, where it involved attempts to part people from their money using bad English and obvious imitations of official […]

Read More… from What makes phishing emails so dangerous?

Can councils do more to prevent data breaches?

When the private information retained by an organisation or government office is disclosed to the public or accessed without authorisation, the result is a data breach. The protection of personal information is regulated in the UK by the Information Commissioner’s Office (ICO), and if this regulator finds inadequate security measures were taken to safeguard data, […]

Read More… from Can councils do more to prevent data breaches?

A look back at when the UK government website was hacked

In recent years, cyberattacks on world governments have been rife, and here in the United Kingdom, local authorities have also suffered assaults on their systems. Back in 2018, UK government agencies and local councils made the headlines when their dedicated websites were knocked offline in a hack that impacted thousands of sites around the world. […]

Read More… from A look back at when the UK government website was hacked

What does the term “Zero Trust Security” mean?

Zero Trust Security refers to a type of network protection model that is founded on stringent identity verification protocols. The dedicated framework dictates and insists that only authorised and authenticated devices and users are enabled to access confidential data and applications. Simultaneously, the process protects these users and applications from advanced threats active on the […]

Read More… from What does the term “Zero Trust Security” mean?