Data Protection Backdoor account identified in Zyxel security solutions Security experts have uncovered a vulnerability in over a 100,000 dedicated Zyxel firewalls, access point…Lydia12th January 2021
Data Protection Best cybersecurity practices for working off site In recent years, new technology solutions and the need to work flexibly have been shaping…Mark8th January 2021
Data Protection What is a social engineering attack? In computing, social engineering is a broad term that covers an extensive array of insidious…Brad30th December 2020
Data Protection Four enterprise challenges of using IP blacklists An approach used for filtering out malicious or fake IP addresses, IP blacklisting has been…Mark28th December 2020
Data Protection What are zero-day vulnerabilities? Zero-day vulnerabilities are weaknesses in computer software that are unknown to individuals and organisations interested…Lydia23rd December 2020
Data Protection Exploring the multiple causes of data leaks Companies that keep or use personal data are required by regulations to provide adequate security…Mark21st December 2020
Data Protection Eight cybersecurity insights to keep you safe From fraudsters seeking to steal financial details to ransomware operators using social engineering to infiltrate,…Lydia19th December 2020
Data Protection Social media icons hide skimming malware A new form of malware has been identified hidden inside sharing icons for social media,…Mark18th December 2020
Data Protection Attack exposes nearly 300,000 US patients’ data US-based healthcare provider AspenPointe has recently informed patients it has suffered a data leak resulting…Mark16th December 2020
Data Protection Three tips to protect your company data Safeguarding sensitive and personal data is the continuing mission of information security officers of enterprises.…Brad14th December 2020