Why an unencrypted email is like a letter without an envelope
Businesses are increasingly using new and innovative options to communicate with colleagues and clients, from dedicated applications for mobile devices to online chat platforms. While…
Businesses are increasingly using new and innovative options to communicate with colleagues and clients, from dedicated applications for mobile devices to online chat platforms. While…
Although spoofed emails are largely associated with spamming campaigns and targeted phishing attacks, there are multiple reasons why spammers and scammers adopt this tactic. Effortlessly…
Today’s IT professionals face a constant barrage of attacks from threat actors. Charged with protecting networks, servers and staff workstations, they must remain both proactive…
Threat operators of renowned ransomware group Maze have claimed responsibility for a targeted ransomware attack on multinational corporation Canon Inc. that was appears to have…
Enterprises in the UK were struck by approximately 5,000 attacks using ransomware in 2019, resulting in pay-outs adding up to almost £210 million, according to…
Put simply, encryption refers to a process that encodes a message in such a way that means only authorised individuals can obtain access to it.…
A data breach is defined as a break in security that leads to the unlawful or accidental destruction, loss, alteration, unauthorised access to or exposure…
If your company uses or stores personal information as part of the work it is involved in, it is essential that you follow the clearly…
A group of hackers known for having associations with the government of North Korea has recently
Following the publication of stolen databases on a hacker forum, several start-up companies have started to disclose details about the data breaches they