Data Protection German telecoms giant discloses data leak German-headquartered telecoms provider T-Mobile has now disclosed it has experienced a data breach in the…Brad4th March 2021
Ransomware Ransomware gang hits Finnish IT services firm One of Finland’s leading IT services and software development firms has been attacked by ransomware…Mark2nd March 2021
Phishing Top tactics used in phishing attacks today The pandemic has seen malicious actors ramp up their phishing campaigns in multi-pronged attacks. Hitting…Mark1st March 2021
Encryption News What are “Common Vulnerabilities and Exposures” (CVEs)? When upgrades are issued for software and hardware used by your firm, you may find…Lydia28th February 2021
Data Protection What are credential stuffing attacks and how can they be conquered? A type of attack method used by cybercriminals, credential stuffing involves malicious operators employing lists…Brad26th February 2021
Cyberattack What is a “botnet”? A botnet is the name given to a collection of enslaved internet-connected computers and other…Lydia25th February 2021
Cyberattack UK cryptocurrency exchange knocked offline A recent distributed denial-of-service (DDoS) attack temporarily took down the servers of EXMO, the well-known…Mark24th February 2021
Cyberattack Why is cybersecurity so critical for educational institutions? Protecting systems and private data is a necessity for every organisation, and those operating in…Brad23rd February 2021
Electronic Signatures How digital signatures help businesses stay resilient Digital transformation has seen a rapid rise in response to the recent COVID-19 pandemic, with…Lydia22nd February 2021
Email What’s the best practice for secure email use? Email is still among the most utilised form of company communications across the world, despite…Mark21st February 2021