Getting to grips with ransomware
While phishing emails and malicious software can wreak havoc on an enterprise’s system, ransomware is gaining ground as a more dangerous weapon in the cybercriminal arsenal that can have costly […]
While phishing emails and malicious software can wreak havoc on an enterprise’s system, ransomware is gaining ground as a more dangerous weapon in the cybercriminal arsenal that can have costly […]
Japanese tech-giant Konica Minolta was recently hit by a newly discovered form of ransomware impacting its services and […]
Read More… from Business technology company struck by ransomware attack
Conducting a phishing test at your company can help identify the reactions of your employees to emails received from hackers. If executed correctly, it can also mean the difference between having a staff member who unconsciously activates malicious links and having one who takes the necessary steps to […]
Read More… from How to test your employees’ reaction to a phishing email
Figures released have shown that at the height of the coronavirus outbreak, the UK’s National Health Service (NHS) was struck by a torrent of […]
Read More… from Data reveals NHS bombarded by scam emails during pandemic peak
Businesses are increasingly using new and innovative options to communicate with colleagues and clients, from dedicated applications for mobile devices to online chat platforms. While this trend seems set to continue, email is still relied on for sending more official – and sometimes confidential […]
Read More… from Why an unencrypted email is like a letter without an envelope
Although spoofed emails are largely associated with spamming campaigns and targeted phishing attacks, there are multiple reasons why spammers and scammers adopt this tactic. Effortlessly easy to employ, email spoofing can be performed in minutes using some […]
Today’s IT professionals face a constant barrage of attacks from threat actors. Charged with protecting networks, servers and staff workstations, they must remain both proactive and well informed. The following are some practical guidelines that can be useful to minimise […]
Threat operators of renowned ransomware group Maze have claimed responsibility for a targeted ransomware attack on multinational corporation Canon Inc. that was appears to have been identified in […]
Read More… from Maze claims ownership of Canon ransomware attack
Enterprises in the UK were struck by approximately 5,000 attacks using ransomware in 2019, resulting in pay-outs adding up to almost £210 million, according to experts at US-based […]
Read More… from Research reveals UK firms paid hackers over £200 million
Put simply, encryption refers to a process that encodes a message in such a way that means only authorised individuals can obtain access to it. Today, many people are turning to instant messaging and chat platforms for communicating, but email is still used predominantly by enterprises for exchanging important information. The contents of such emails […]
A data breach is defined as a break in security that leads to the unlawful or accidental destruction, loss, alteration, unauthorised access to or exposure of […]
Read More… from Correct notification process following a data breach
If your company uses or stores personal information as part of the work it is involved in, it is essential that you follow the clearly designed rules on data protection, developed to safeguard people’s private details. These data protection rules apply to information held on […]