Data Protection What are zero-day vulnerabilities? Zero-day vulnerabilities are weaknesses in computer software that are unknown to individuals and organisations interested…Lydia23rd December 2020
Ransomware Eight ways to minimise ransomware risks Along with exorbitant bitcoin payments, ransomware operators have been stealing headlines this year, attacking companies…Brad22nd December 2020
Data Protection Exploring the multiple causes of data leaks Companies that keep or use personal data are required by regulations to provide adequate security…Mark21st December 2020
Ransomware Electronics multinational faces $34m ransom International electronics manufacturing giant Foxconn is facing a multimillion-dollar ransom demand after its facility based…Lydia20th December 2020
Data Protection Eight cybersecurity insights to keep you safe From fraudsters seeking to steal financial details to ransomware operators using social engineering to infiltrate,…Lydia19th December 2020
Data Protection Social media icons hide skimming malware A new form of malware has been identified hidden inside sharing icons for social media,…Mark18th December 2020
Email How to report fraudulent emails to the NCSC Fraudulent emails are electronic messages that are designed to fool victims for personal and criminal…Brad17th December 2020
Data Protection Attack exposes nearly 300,000 US patients’ data US-based healthcare provider AspenPointe has recently informed patients it has suffered a data leak resulting…Mark16th December 2020
Phishing How Ledger users can secure their assets Hardware wallets like those provided by Ledger are a specific kind of bitcoin wallet that…Mark15th December 2020
Data Protection Three tips to protect your company data Safeguarding sensitive and personal data is the continuing mission of information security officers of enterprises.…Brad14th December 2020