Electronic Signatures Three reasons why document transfers should use digital signatures If your business involves process where a large volume of physical documents must be managed…Lydia17th January 2021
Data Protection What’s wrong with using FTP for transferring large files? A network protocol dating back to 1970s, the File Transfer Protocol or FTP is used…Lydia15th January 2021
Data Protection Backdoor account identified in Zyxel security solutions Security experts have uncovered a vulnerability in over a 100,000 dedicated Zyxel firewalls, access point…Lydia12th January 2021
Cyberattack Russian cryptocurrency exchange hit by hackers After losing control of its dedicated servers, Livecoin, the Russian exchange for cryptocurrency, has been…Lydia10th January 2021
File Integrity Monitoring How to set up effective File Integrity Monitoring File Integrity Monitoring, or FIM for short, is the name given to IT security processes…Lydia2nd January 2021
Spoofing How to protect your firm from BEC attacks A Business Email Compromise (BEC) attack starts with a hacker using spoofed email accounts to…Lydia26th December 2020
Data Protection What are zero-day vulnerabilities? Zero-day vulnerabilities are weaknesses in computer software that are unknown to individuals and organisations interested…Lydia23rd December 2020
Ransomware Electronics multinational faces $34m ransom International electronics manufacturing giant Foxconn is facing a multimillion-dollar ransom demand after its facility based…Lydia20th December 2020
Data Protection Eight cybersecurity insights to keep you safe From fraudsters seeking to steal financial details to ransomware operators using social engineering to infiltrate,…Lydia19th December 2020
Email Mac users targeted by hackers with upgraded malware Cybersecurity researchers have linked a new spate of malware assaults to the hacking group APT32,…Lydia12th December 2020