North-Korean hackers swap tactics
A group of hackers known for having associations with the government of North Korea has recently […]
A group of hackers known for having associations with the government of North Korea has recently […]
Following the publication of stolen databases on a hacker forum, several start-up companies have started to disclose details about the data breaches they […]
Read More… from Hacked start-ups admit breaches after huge data leak
It is not very common to see schools actively integrate practical learning experience in their regular curriculum. On this front, Gems Modern Academy, Dubai has set an excellent example through their industry internship program for the senior students. Galaxkey was happy to support this initiative through a tailored internship program combining classroom learning with hands-on […]
Read More… from Galaxkey and Gems Modern Academy Dubai introduce cyber security to students
As cybersecurity developers create ever more complex defences for businesses to safeguard sensitive data, cybercriminals work equally hard finding ways to bypass them. While this ongoing struggle continues, enterprises must still ensure their data is […]
Read More… from Five enterprise benefits of using encryption
[vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_column_text]Devices that slow down or behave in an unexpected way could have been infected with malware. While some malware added to your computer can simply be disruptive to your workflow, it can also […]
[vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom” bg_image_animation=”none”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_link_target=”_self” column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_width_inherit=”default” tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” bg_image_animation=”none”][vc_column_text]Personally Identifiable Information, or PII for short, is data that has the potential to identify a particular individual. It covers a wide range of information that can be employed to distinguish […]
Read More… from Five steps to protect Personally Identifiable Information online
Over 20 charities and universities based in the UK, Canada, and the USA, including Oxford’s University College, have now confirmed they have fallen victim to a data breach, after their software provider […]
The production and dedicated services of Garmin, the maker of smartwatches and other wearables, went down following a ransomware attack on […]
Read More… from Smartwatch services disrupted by ransom attack
From lists of contacts for spamming campaigns, to Personally Identifiable Information (PII) for spear phishing strategies, enterprise email accounts represent a virtual treasure chest for cybercriminals to […]
Read More… from Seven steps to take after your email account is hacked
When enterprise networks and the data records they store are infiltrated by cybercriminals, the consequences can be catastrophic and costly. The larger the […]
In order to carry out its business processes, every organisation must move information. Whether its uploading client information to cloud-based storage or filing financial records on a local server, dataflow must […]
Read More… from Enhance your enterprise security by protecting data in transit
Personal and company email addresses can provide cybercriminals with a wealth of new opportunities to execute their schemes and scams. Infiltrated email addresses can supply a mine of useful information for hackers to […]
Read More… from What can criminals do with my email address?