Data Protection German telecoms giant discloses data leak German-headquartered telecoms provider T-Mobile has now disclosed it has experienced a data breach in the…Brad4th March 2021
Data Protection What are credential stuffing attacks and how can they be conquered? A type of attack method used by cybercriminals, credential stuffing involves malicious operators employing lists…Brad26th February 2021
Data Protection How to react correctly following a data breach The most successful firms operating today are acutely aware of the most common issues haunting…Brad20th February 2021
Data Protection What is the purpose of enterprise data classification? To ensure enterprise data is protected correctly, it’s essential that IT professionals understand the information…Mark18th February 2021
BusinessData Protection Complete peace of mind when sending business files securely Businesses now run on data. From ever-increasing amounts of customer information, to contracts and financial…Faye Clowes2nd February 2021
Data Protection Seven features every secure workspace requires Whether your enterprise operates in the commercial or educational sector, to function effectively data must…Lydia28th January 2021
Data Protection Top data loss prevention protocols for email Data Loss Prevention, or DLP for short, is among the most powerful tools an enterprise…Brad19th January 2021
Data Protection What does a man in the middle (MITM) attack involve? The term man in the middle (MITM), refers to a cybercriminal attack where a threat…Mark16th January 2021
Data Protection What’s wrong with using FTP for transferring large files? A network protocol dating back to 1970s, the File Transfer Protocol or FTP is used…Lydia15th January 2021
Data Protection Data leak broker releases private user records A broker in stolen data is selling a vast quantity of files belonging to 26…Brad14th January 2021