Web hosting giant GoDaddy reveals shocking hacker breach

GoDaddy, a leading US web hosting company supplying services to many countries including the UK recently announced it has suffered a data breach. The malicious attack involved unknown threat operators stealing its source code and installing malware on its dedicated servers. Reports indicate that attackers penetrated GoDaddy’s servers after accessing its cPanel in what appears […]

Read More… from Web hosting giant GoDaddy reveals shocking hacker breach

Cyberattack on Scandinavian Airlines results in customer data leak

The flag carrier for Norway, Sweden and Denmark, Scandinavian Airlines (SAS), recently posted a security advisory notice for passengers. The airline warned passengers that a multi-hour outage its mobile application and company website had experienced was the result of a targeted cyberattack. It also advised them that customer data was exposed in the incident. […]

Read More… from Cyberattack on Scandinavian Airlines results in customer data leak

US hospital devastated by intense cyberattack that causes over 3 days of disruption

North Florida’s Tallahassee Memorial HealthCare was recently forced to shut down its dedicated IT systems and to pause all non-emergency procedures after it was hit by a targeted cyberattack. Although all the healthcare provider’s systems were down, the hospital stated that the malicious incident only impeded a portion of them. […]

Read More… from US hospital devastated by intense cyberattack that causes over 3 days of disruption

Defending Against MITM Attacks: The Role of Email Encryption in Company Security

Man-in-the-middle attacks (Often abbreviated to MITM attacks) involve a threat operator intercepting email communication between two different parties with a variety of malicious aims in mind. In this blog, we’ll take a closer look at this type of cyberattack and why using email encryption is the best way to protect against it. Read on to […]

Read More… from Defending Against MITM Attacks: The Role of Email Encryption in Company Security

Email encryption and HIPAA: a quick, useful guide

Many healthcare professionals experience anxiety at the idea of meeting HIPAA (Health Insurance Portability and Accountability Act) regulations while emailing Protected Health Information, or PHI for short. However, email is becoming a more frequently employed distribution option for sharing PHI with other caregivers and patients. However, to remain compliant with HIPAA, all healthcare organisations must […]

Read More… from Email encryption and HIPAA: a quick, useful guide

Encrypted emails: how long do they truly last?

Email encryption offers enterprises an effective method of protecting communication that includes a wide range of sensitive content. For example, it can protect emails containing personally identifiable information (PII) on staff, customers or even healthcare patients. However, it can also safeguard confidential company contracts that require a signature, or invoices containing financial information like account […]

Read More… from Encrypted emails: how long do they truly last?

What is email encryption and how does it work?

Email remains one of the most common methods for enterprises to communicate both internally and externally with partners, suppliers, and customers. Figures show that as of 2022, over 333.2 billion messages are sent via email every day around the globe. Emails are often used to issue invoices, contracts, personnel records, and other important business documentation. […]

Read More… from What is email encryption and how does it work?

How do GDPR and email encryption go hand in hand?

While email encryption is not technically a legal requirement for enterprises under the General Data Protection Regulation (GDPR), it can help them remain compliant with it. The GDPR outlines the level of care that must take to avoid the exposure of personal data and, in this blog, we’ll take a closer look at why email […]

Read More… from How do GDPR and email encryption go hand in hand?