Protecting your central networks and data as everyone goes mobile
The growing shift to remote-working, both during and post pandemic, has confirmed predictions that the future is mobile and that mobile devices are set to become the standard way of accessing pretty much everything. But how will you protect your crucial business systems and sensitive data from new threats introduced by remote and mobile access? […]
Read MoreMobile devices still crucial to businesses despite the known security risks
Both the business and personal world is becoming ever more dependent on mobile devices, be they smart phones or tablet computers. This became even more evident during the coronavirus lockdowns when many employees had to work from home and most people shopped from home too. Figures just released show that in the first quarter of […]
Read MoreMillions of LinkedIn accounts leaked
An unknown individual was recently reported to be offering the personal data of 500million LinkedIn users for sale on a popular cybercriminal forum. The files contain key information including their full names, email addresses, phone numbers, workplace information, employment history and additional personal details. The threat actor was auctioning the database for at least a […]
Read MoreMost employees do not consider security issues when WFH
According to a new survey from VPNOverview.com, almost 70% of UK workers have given no thought to the cybersecurity implications of working from home. The survey quizzed 2043 employees across the UK and concluded that most were lacking in awareness of both the threats and their potential solutions. That means they could be putting their […]
Read MoreCredential theft attacks are soaring
The number of cyberattacks that resulted in large-scale credential thefts doubled between 2016 and 2020, according to a report by security vendor F5. Poor security practice, as well as an increase in people working remotely, is thought to be behind the increased number of attacks. Passwords stored as plaintext were deemed responsible for around 4 […]
Read MoreHome-working is putting company systems and data at risk
The Coronavirus pandemic has caused a seismic shift in working practices with millions of employees being forced to work from home because their offices have been closed. Many will stay that way, because the economics and work patterns have changed permanently, but it is presenting companies with numerous issues – not least cybersecurity. There are […]
Read MoreHow to deal with a data breach notification
With shoppers rushing to their keyboards over the Black Friday weekend, it is more important than ever to consider the security of your personal data and what to do if an online retailer you use suffers a data breach. If this happens, and your account access or personal data is compromised, you should receive a […]
Read MoreEmerging trends in cloud technology and cloud computing
The explosion of cloud computing has massively changed how organisations do business, and its popularity is showing no sign of abating. According to Cisco, by 2021 cloud-based datacentres are expected to process in excess of 90% of all workloads. Here are some of the emerging trends. 1: Multi and hybrid cloud environments More organisations are […]
Read MoreHow cybercriminals are making hay during the Coronavirus pandemic
It seems that not a day goes by without some sort of data-breach or cyberattack against a high-profile organisation taking place. So why is this happening? Firstly, millions more people are working from home because of the pandemic. This is creating more opportunities for cybercriminals, and many of those employees are not following security best-practice. […]
Read MoreWhy is Multi-factor authentication (MFA) not more widely used?
Recent studies have indicated that the vast majority of computer users do not use multi-factor authentication (MFA). But what exactly is it? How does it work? And why doesn’t everyone use it? What is Multi-factor authentication? MFA is a method of authentication where the user has to provide at least two verification factors in order […]
Read More