Why companies should consider their digital footprint
One aspect that enterprises must consider when of protecting themselves from potential cyber threats is to acknowledge the danger of digital footprints. Sometimes referred to…
One aspect that enterprises must consider when of protecting themselves from potential cyber threats is to acknowledge the danger of digital footprints. Sometimes referred to…
Entrust, the digital security giant, recently confirmed that it had been struck by a targeted cyberattack. The hit involved threat operators breaching the security firm’s…
To take advantage of specialist knowledge and skills available possessed by different individuals and organisations, collaboration is an essential process for every successful company.
Phishing emails can have devastating consequences for companies when they fool recipients. These scam messages can include malicious links and attachments and, if users interact…
To remain competitive and operate at their optimum, businesses must be agile while staying secure.
Experts have uncovered a threat operator infecting dedicated industrial control systems (ICS) to build a botnet using password crunching software designed for programmable logic controllers…
Ransomware has become an increasingly popular form of attack for threat operators in recent years. So much so that many cybercriminal gangs have switched out…
Multifactor authentication (MFA) is a recommended method for safeguarding secure information protected by passwords. MFA adds an extra layer of protection that can mitigate date…
The already high number of organisations paying out following ransomware attacks is increasing. This continuing spike has prompted the UK’s Information Commissioner’s Office (ICO) and…
A recent data leak at the leading comic book reading platform known as Mangatoon has now resulted in private information belonging to 23 million users…