Three essential security practices for malware protection
The National Cyber Security Centre (NCSC) website recommends that companies should always work on the premise that systems may be
The National Cyber Security Centre (NCSC) website recommends that companies should always work on the premise that systems may be
From anti-malware to website spoofing and spear fishing, there are a wide range of terms that have been developed by cybersecurity experts to describe the…
Campari Group, the well-known Italian beverage firm, was knocked effectively offline following a recent ransomware attack. The company has refused to
This year has shown that phishing attacks are just as rampant as ever, with many threat operators taking advantage of the chaos caused by the…
A distributed denial-of-service attack, also abbreviated to a DDoS attack, is an assault where numerous devices with compromised systems simultaneously hit a target – typically…
Cybercriminals have a raft of tactics and tricks they employ against organisations and individuals, from targeted whaling attacks on top executives to social engineering scams…
A data leak refers to a breakdown in security measures leading to either the criminal or accidental loss, change or destruction of personal data, or…
Encryption is designed to safeguard data kept on a device or in network storage. Every enterprise, from start-ups to global corporations, that gathers or retains…
The Marriott hotel group has received a massive fine of £18.4m from UK data regulator, the Information Commissioner’s Office (ICO), over a data breach that
November 2020: Galaxkey, the cybersecurity company that blends a perfect balance between the highest level of security and usability, has announced that Galaxkey Secure Workspace…