Study shows ignorance of and critical need to secure important documents

New research from the Business Performance Innovation (BPI) Network says there is a widespread and increasing need to improve security practices surrounding confidential documents in most organisations today. Read about the new study by Business Performance Innovation Network which reveals that ninety-five percent of the respondents expressed concerns about the security of documents in their […]

The 6 Riskiest Social Media Habits to Avoid at Work

Cybercriminals are turning to Facebook, Twitter and other platforms to launch attacks via employee behavior that could be putting your business at risk. Read/see the slideshow explaining the six riskiest social media habits that employees should avoid at work on Dark Reading.

Security Testing Should Be The Highest Priority For The Internet Of Things

Read why David Bolton says that security testing should be the highest priority for the Internet of Things devices on Arc Applause Blog : Companies that integrate Internet of Things solutions into their working practices must make testing a priority, especially if they want to reduce the chances of a security breach. A recent report by […]

Study: 96% of Websites Get Attacked by Bad Bots

The Internet is full of bots, some of which don’t have your best interest at heart. In fact, bad bots attack 96% of websites with login pages and highly active within user accounts. This makes companies be at risk of data theft, account takeover, and even fraud. Read about the new research by Distil Networks […]

3 Important New Cyber Security Trends

Read  Jeff Charles list three new important cyber security trends on Small Biz Trends : If 2016 was the year of cyber attacks, 2017 is the year of prevention. Twelve months ago, experts were predicting an increase in the innovation and sophistication of cyber attacks and a greater breakdown in security measures on a global […]

Dealing With Email Security Threats

Although cyber-security issues seemingly become murkier by the day, one thing is very clear: Email is increasingly at the center of enterprise breaches. However, despite perceptions that these attacks mostly originate from the outside, many breaches are connected to internal glitches, breakdowns and problems, according to a February 2017 report from email security vendor Mimecast […]

Hacker Lexicon: What Is an Attack Surface?

Read Paul Taylor explain what attack surface means in hacking lexicon on Wired : Amid so many recent high-profile hacks and data breaches, security experts are fond of pointing out that there’s no such thing as perfect security. It’s true! But it also invites the question: Why doesn’t literally everything get hacked all the time? […]

The Easiest Way To Protect Your Devices From Hacks? Keep Them Updated

Read why Brian Barrett says that the easiest way to protect your devices from hacks is to keep them updated on Wired : This week’s WikiLeaks revelations, which showed that the CIA can compromise a huge range of devices, shouldn’t send you into paroxysms of fear over your smartphone. It should, though, be a solid […]

7 Security Steps To Defend Your Company From A DDoS Attack

Of all the cybersecurity threats today’s businesses face, distributed denial-of-service (DDoS) attacks are among the most complex and devastating. This type of breach involves multiple compromised systems that work in conjunction to shut down service. Read about the seven steps to defend your company from a DDoS attack on Forbes.

Ransomware: An executive guide to one of the biggest menaces on the web

Cybercriminals didn’t use to be so obvious. If hackers infiltrated your corporate network, they would do everything possible to avoid detection. It was in their best interests not to alert a victim that they’d fallen victim to cybercrime. Read the executive’s guide to dealing with ransomware attacks on ZDNet.