Phishing is a social engineering attack used to obtain sensitive information, such as login credentials and payment details, from users. It happens when an attacker, posing as a trusted source,…
With dispersed workforces and so many moving pieces to manage, IT security can be overwhelming. But by getting 5 security basics right, you can protect against 98% of all attacks:* [vc_empty_space]…
Technology has played an essential role in the day to day lives of many businesses over the past 18 months, helping them thrive in the face of some extremely tough…
Ransomware was once again the top threat this quarter that Cisco Talos Incident Response (CTIR) saw in their engagements in Q4 2021, wrapping up a year that was dominated by…
Protecting your development environment from cyber attacks enables you to maintain the confidentiality and integrity of your product data. Having a regularly tested disaster recovery plan will enable you to…
Developers are not always security experts, so it is essential they have access to appropriate training, expertise and useable, up-to-date development tools, such as compilers, static code analysers and simulators.…
As COVID-19 restrictions ease, vaccinations rise, and workers return to the office, it’s important to make sure you’re prepared to prevent any cybersecurity, technical, and safety issues from affecting your…
Cybercriminals are impersonating the email addresses of unsuspecting businesses to conduct malicious and illicit activities. Businesses that fall victim to impersonation or “domain spoofing” as it’s better known, can often…
Businesses were forced to react to the impact of Covid-19 with little time to prepare their employees for remote working. Many businesses scrambled to provide “temporary” remote working solutions that…