What does the term “double extortion” refer to?
Out of the numerous cyberattacks aimed at enterprises, governments and educational organisations, ransomware is fast becoming a favoured option of threat actors. Many known attackers…
Out of the numerous cyberattacks aimed at enterprises, governments and educational organisations, ransomware is fast becoming a favoured option of threat actors. Many known attackers…
Protective security involves putting measures and countermeasures in place to defend an enterprise or institution’s assets against potential risks. Protective security protocols are designed to…
It is becoming more commonplace each year for communication platforms, channels and services to advertise the implementation of end-to-end encryption for added security. The concept…
Protecting private company email accounts and sensitive areas of a system with company credentials is a common practice for many firms. Unfortunately, if these passwords…
Enterprise security chiefs possess many technical tools to safeguard their systems and devices. Firewalls, antivirus, anti-malware software and spam filters all help networks and computers…
Despite their vulnerabilities, passwords featuring letters, numbers and symbols are still commonly used by many companies to defend the private data they handle from falling…
To mark National Computer Security Day, we’re taking a closer look at this commemorative occasion and offering some ideas on how your company can honour…
From IT security admins to Chief Information Officers (CIOs), those charged with data security for enterprises understand that the human element of a firm is…
The General Data Protection Regulation’s (GDPR) security principles demand that firms use appropriate organisational and technical measures to ensure personal data is processed safely. In…
Britain’s largest online fishing supply shop, Angling Direct, was recently hacked by malicious operators with keen anglers using the ecommerce platform finding themselves redirected to…