New research from the Business Performance Innovation (BPI) Network says there is a widespread and increasing need to improve security practices surrounding confidential documents in most organisations today. Read about the new study by Business Performance Innovation Network which reveals that ninety-five percent of the respondents expressed concerns about the security of documents in their […]
Read why David Bolton says that security testing should be the highest priority for the Internet of Things devices on Arc Applause Blog : Companies that integrate Internet of Things solutions into their working practices must make testing a priority, especially if they want to reduce the chances of a security breach. A recent report by […]
The Internet is full of bots, some of which don’t have your best interest at heart. In fact, bad bots attack 96% of websites with login pages and highly active within user accounts. This makes companies be at risk of data theft, account takeover, and even fraud. Read about the new research by Distil Networks […]
Read Jeff Charles list three new important cyber security trends on Small Biz Trends : If 2016 was the year of cyber attacks, 2017 is the year of prevention. Twelve months ago, experts were predicting an increase in the innovation and sophistication of cyber attacks and a greater breakdown in security measures on a global […]
Although cyber-security issues seemingly become murkier by the day, one thing is very clear: Email is increasingly at the center of enterprise breaches. However, despite perceptions that these attacks mostly originate from the outside, many breaches are connected to internal glitches, breakdowns and problems, according to a February 2017 report from email security vendor Mimecast […]
Read Paul Taylor explain what attack surface means in hacking lexicon on Wired : Amid so many recent high-profile hacks and data breaches, security experts are fond of pointing out that there’s no such thing as perfect security. It’s true! But it also invites the question: Why doesn’t literally everything get hacked all the time? […]
Read why Brian Barrett says that the easiest way to protect your devices from hacks is to keep them updated on Wired : This week’s WikiLeaks revelations, which showed that the CIA can compromise a huge range of devices, shouldn’t send you into paroxysms of fear over your smartphone. It should, though, be a solid […]
Of all the cybersecurity threats today’s businesses face, distributed denial-of-service (DDoS) attacks are among the most complex and devastating. This type of breach involves multiple compromised systems that work in conjunction to shut down service. Read about the seven steps to defend your company from a DDoS attack on Forbes.
Cybercriminals didn’t use to be so obvious. If hackers infiltrated your corporate network, they would do everything possible to avoid detection. It was in their best interests not to alert a victim that they’d fallen victim to cybercrime. Read the executive’s guide to dealing with ransomware attacks on ZDNet.