Data Protection What is a social engineering attack? In computing, social engineering is a broad term that covers an extensive array of insidious…Brad30th December 2020
Data Protection Four enterprise challenges of using IP blacklists An approach used for filtering out malicious or fake IP addresses, IP blacklisting has been…Mark28th December 2020
Spoofing How to protect your firm from BEC attacks A Business Email Compromise (BEC) attack starts with a hacker using spoofed email accounts to…Lydia26th December 2020
Phishing Safeguarding your enterprise from spear phishing Spear phishing attacks are targeted assaults aimed at specific individuals and enterprises to trick them…Brad25th December 2020
Cyberattack Massive cyberattack hits US organisations The SolarWinds supply chain attack was officially identified on December 13, but its impact was…Mark24th December 2020
Data Protection What are zero-day vulnerabilities? Zero-day vulnerabilities are weaknesses in computer software that are unknown to individuals and organisations interested…Lydia23rd December 2020
Ransomware Eight ways to minimise ransomware risks Along with exorbitant bitcoin payments, ransomware operators have been stealing headlines this year, attacking companies…Brad22nd December 2020
Data Protection Exploring the multiple causes of data leaks Companies that keep or use personal data are required by regulations to provide adequate security…Mark21st December 2020
Ransomware Electronics multinational faces $34m ransom International electronics manufacturing giant Foxconn is facing a multimillion-dollar ransom demand after its facility based…Lydia20th December 2020
Data Protection Eight cybersecurity insights to keep you safe From fraudsters seeking to steal financial details to ransomware operators using social engineering to infiltrate,…Lydia19th December 2020