Data Protection Top data loss prevention protocols for email Data Loss Prevention, or DLP for short, is among the most powerful tools an enterprise…Brad19th January 2021
Email From email to FTP: Sharing files securely An incalculable quantity of digital data is sent and received via the internet every minute…Brad15th January 2021
Data Protection Data leak broker releases private user records A broker in stolen data is selling a vast quantity of files belonging to 26…Brad14th January 2021
Spoofing Safeguarding staff against email spoofing Email spoofing is just one of the techniques used by cybercriminals in their insidious campaigns.…Brad6th January 2021
Data Protection What is a social engineering attack? In computing, social engineering is a broad term that covers an extensive array of insidious…Brad30th December 2020
Phishing Safeguarding your enterprise from spear phishing Spear phishing attacks are targeted assaults aimed at specific individuals and enterprises to trick them…Brad25th December 2020
Ransomware Eight ways to minimise ransomware risks Along with exorbitant bitcoin payments, ransomware operators have been stealing headlines this year, attacking companies…Brad22nd December 2020
Email How to report fraudulent emails to the NCSC Fraudulent emails are electronic messages that are designed to fool victims for personal and criminal…Brad17th December 2020
Data Protection Three tips to protect your company data Safeguarding sensitive and personal data is the continuing mission of information security officers of enterprises.…Brad14th December 2020
Data Protection A guide to understanding Personally Identifiable Information In today’s cybercriminal world, Personally Identifiable Information, or PII for short, has become a much…Brad8th December 2020