How to protect personally identifiable information over email
From innovative chat applications to collaborative, software there are multiple options to communicate information online today. However, for many enterprises, email is still the
From innovative chat applications to collaborative, software there are multiple options to communicate information online today. However, for many enterprises, email is still the
The most common defence methods used against phishing tactics rely heavily on users recognising attacks. While there is no doubt that identifying phishing scams is…
Personally Identifiable Information, often referred to simply as PII, is the name given to any form of data that can be employed to identify a…
For many organisations and institutions sharing data is a necessary and regular part of their work. From logistics companies requiring personal addresses, to healthcare facilities…
EasyJet executives have apologised to customers following a major data breach exposing both financial and personal information. Reports by the
Regardless of what sector an enterprise or organisation works in, it is crucial that confidential data is always well protected. Company security demands that private…
From chat applications to dedicated platforms offering video and audio options, there are a wealth of new communication methods open to enterprises, but despite this,…
Reports of confirmed attacks with the intention of mining cryptocurrency are coming in from multiple countries around Europe. Supercomputers based in
New research indicates that businesses in the UK applying to the government for support during the coronavirus pandemic are facing an increased risk from schemes…
Threat actors have used Maze ransomware to attack two companies based in the United States. Cybercriminal attacks