Businesses must take responsibility for mobile security, when users fail

Mobile users frequently stray from official app stores when looking for new mobile applications, putting themselves under increased risk from malware, ransomware and other malicious actors. This is according to a new report by RiskIQ, which says that users in the UK are a bit more ‘conservative’, and a bit more on the safe side, […]

Top 3 tips to protect your business from hackers

Read the top three tips to protect your business from hackers according to Kristina Knight on Biz Report : “Most small business owners don’t think they are at risk, yet 43% of small businesses have been victims of cyber attack. As a result, 60% of small businesses that suffer a cyber attack are out of business […]

Low-tech threats make high-tech cybersecurity everyone’s business

It just might be a low-tech fake email, not a high-tech hacking scheme, that makes it hard for businesses and organizations to safeguard information in modern times. Firewalls and cutting-edge technology designed to keep networks safe and secure can be undone simply by asking employees to click a link. Read how low-tech threats make cyber […]

Cybercriminals Turning Attention to Targeted Ransomware Attacks Against Businesses

More and more cybercriminals are turning their attention from attacks against private users to targeted ransomware attacks against businesses, according to researchers at Kaspersky Lab. At least eight groups of cybercriminals involved in encryption ransomware development and distribution have been identified. Read about the new Kaspersky Lab report which reveals that cyber criminals are using targeted […]

Top 5 Dumbest Cyber Threats That Still Pay Off

The common conception of cyber attacks are kind of like bad weather, ranging from irritating to catastrophic, but always unpredictable. Hackers are simply too sophisticated to draw any reliable judgments about, and we shouldn’t try. Read about the five dumbest cyber security threats that are still effective on Dark Reading.

Legal Departments Face High Data Breach Risk, But Few Easy Solutions

While many employees in an organization handle data on a day-to-day basis, none are perhaps as exposed as those in the legal department. Attorneys, legal operations and supporting staff often work closely with other departments, and in so doing come into contact with very sensitive data. Read why legal departments face high data breach risk […]

How to protect your practice when data breach hits a partner

Read Julie Knudson’s article about how healthcare practitioners can protect against data breach when their partner has been hit by a data breach on Medical Economics : A cyberattack affecting nearly 200 hospitals, clinics and independent practices—exposing an estimated 3.9 million records—occurred in 2015 when systems at NoMoreClipboard, an online patient portal and personal health […]

Phishing – Why We Keep Getting Netted

Read why Adam Vincent says that phishing  remains the top cyber threat for businesses on Infosec Magazine : As the news of yet another celebrity photo leak hits the headlines, the suspicion is that it’s the result of a phishing attack. While some individuals may be practicing cyber safety online, phishing is still one of the […]

IT Security Pros and Network Operators More Concerned About DDoS Attacks in 2017

DDoS attacks are a greater security threat to businesses in 2017 than ever before, and Internet Service Providers (ISPs) need to do something about it according to a new survey of IT security professionals and network operators released by Corero Network Security Read more about the new report by Corero Network Security which reveals that […]

Layered defence in the connected world

Read  Darren Anstee’s article about layered defense in the connected world on IT Pro Portal : The connected world is upon us, and the Internet of Things (IoT) promises more personalised and automated services, optimised resource utilisation, and added convenience, but have we stopped to consider the risks that come with the benefits? Read her […]