What ransomware infection vectors should educational authorities understand?
With a wealth of sensitive data retained on file, local educational authorities (LEAs), just like local councils, are a prime target for certain cybercriminal operations.…
With a wealth of sensitive data retained on file, local educational authorities (LEAs), just like local councils, are a prime target for certain cybercriminal operations.…
Threat operators have been identified hacking servers belonging to Microsoft Exchange, using and ProxyLogon and ProxyShell exploits to deploy malware and circumnavigate detection with the…
To mark National Computer Security Day, we’re taking a closer look at this commemorative occasion and offering some ideas on how your company can honour…
The zombie botnet known as Emotet has been raised again and returned to active service. Its original operator was persuaded by the Conti ransomware group…
Despite its numerous vulnerabilities, email continues to be the leasing choice for business communications across the globe. From missent messages containing private documents to unprotected…
Electronic or e-signatures are an innovative and efficient way of completing documents. Respected as a legally acceptable alternative to traditional “wet ink” signatures, a document…
A fresh wave of attacks began recently, resulting in almost 300 WordPress sites being hacked.
From IT security admins to Chief Information Officers (CIOs), those charged with data security for enterprises understand that the human element of a firm is…
MediaMarkt, the retail giant specialising in electronics, recently suffered a targeted attack employing Hive ransomware.
The General Data Protection Regulation’s (GDPR) security principles demand that firms use appropriate organisational and technical measures to ensure personal data is processed safely. In…