Cyberattack Three types of Distributed Denial of Service (DDoS) attacks A cybercriminal strategy that renders an online service temporarily unavailable to customers and other users…Mark18th January 2021
Data Protection What does a man in the middle (MITM) attack involve? The term man in the middle (MITM), refers to a cybercriminal attack where a threat…Mark16th January 2021
Email What are the principles of email security? Despite the security risks involved in transmitting private information via email, for communication and document…Mark13th January 2021
Data Protection Best cybersecurity practices for working off site In recent years, new technology solutions and the need to work flexibly have been shaping…Mark8th January 2021
Ransomware Exploring WannaCry ransomware In 2017, WannaCry stole headlines, impacting over 230,000 devices around the world and causing billions…Mark4th January 2021
Data Protection Four enterprise challenges of using IP blacklists An approach used for filtering out malicious or fake IP addresses, IP blacklisting has been…Mark28th December 2020
Cyberattack Massive cyberattack hits US organisations The SolarWinds supply chain attack was officially identified on December 13, but its impact was…Mark24th December 2020
Data Protection Exploring the multiple causes of data leaks Companies that keep or use personal data are required by regulations to provide adequate security…Mark21st December 2020
Data Protection Social media icons hide skimming malware A new form of malware has been identified hidden inside sharing icons for social media,…Mark18th December 2020
Data Protection Attack exposes nearly 300,000 US patients’ data US-based healthcare provider AspenPointe has recently informed patients it has suffered a data leak resulting…Mark16th December 2020