Why cybersecurity training should be included during onboarding
Introducing new employees and bringing their knowledge up to date regarding company policy and procedures, also known as employee onboarding, is today standard practice. This…
Introducing new employees and bringing their knowledge up to date regarding company policy and procedures, also known as employee onboarding, is today standard practice. This…
Cybersecurity protocols are designed to keep businesses safe from malicious actors, but they also protect people. From employees and clients to partners and suppliers, individuals…
From local and national governments to educational institutions and enterprises, organisations of all sizes around the world rely on email to communicate.
Snap-on, the American manufacturer specialising in automotive tools, recently confirmed a data breach had taken place on its network.
The ability to operate swiftly and effectively is key for any business to succeed. However, it is equally vital that when business processes involve data…
A Remote Access Trojan, also called a RAT, can infect enterprise devices just like any other form of malware. They can be attached to a…
A recently unleashed Trojan that combines ransomware, spyware and remote access in a single malicious package has been named after one of British comedian Sacha…
A recently identified cyberattack has seen a compromised Trezor brand hardware wallet mailing list employed to issue false data breach notices in order to steal…
A coordinated strike conducted by the US’s Federal Bureau of Investigation (FBI) in association with its law enforcement partners around the world has resulted in…
A business email compromise attack (or BEC attacks for short) is a form of cybercrime that utilises email fraud tactics. Victims of BEC attacks are…