Hundreds of businesses potentially affected after Lapsus$ hacks Okta By Rob Clymo published 25 March 22 A full explanation has been issued by SaaS provider Okta following the publication of computer screenshots
Nestlé denies being hacked as Anonymous goes for the Bank of Russia By Rob Clymo published 24 March 22 Anonymous continues to pursue its cyberwar on big businesses still operating in Russia
Thailand clamps down on using crypto for making payments By Rob Clymo published 24 March 22 The purchasing power of crypto takes a hit in Thailand as officials get nervous about it adversely affecting the economy
Microsoft investigates infiltration claims from Lapsus$ cybercrime ring By Rob Clymo published 23 March 22 New claims of stolen code means Microsoft could be added to a growing list of compromised computing giants
Europe and America sees huge rise in ransomware attacks since January By Rob Clymo published 23 March 22 Businesses are being encouraged to beef up their security procedures in the wake of rising ransomware attacks
SMBs are facing increased cyberthreats from skyrocketing bot traffic By Rob Clymo published 22 March 22 Bots are homing in on the vulnerability of small and medium-sized business websites
10 best practice processes for dealing with major IT incidents By Prithiv RajKumar published 11 March 22 Major IT incidents can be a huge problem for any business and any IT team. Learn the best practice and how to deal with present and future crises.
Disaster recovery vs. cloud backup – what's the difference? By Sarah Doherty published 10 March 22 We'll explain the difference between disaster recovery and cloud backup
The importance of maintaining cyber security in your business By Scott Bordoni published 9 March 22 With cyber attacks on the up, there’s no better time for small businesses to take a look at their handling of company data. Here's how you can do that.
Best antivirus software of 2022 By Sead Fadilpašić published 8 March 22 These are the best antivirus software choices around today to help keep your computer safe.
The four most popular methods hackers use to spread ransomware By Antonio Challita published 8 March 22 Understanding how ransomware spreads is the key to avoiding falling victim to an attack. In this article we'll explain how.
Cybersecurity predictions and best practices in 2022 By Avishai Wool published 8 March 22 As we continue to deal with the pandemic effect, what can we expect to see in 2022? Here are my thoughts on some of the most talked about topics in cybersecurity and network management.
Cyber-attack fallout: the knock-on effects a business can suffer By Neville Louzado published 7 March 22 A data loss or cash ransom can be just the beginning: we highlight some of the knock-on effects a business may suffer from a cyber-attack.
How a Common Identity Platform makes security seamless By Jacob Ideskog published 4 March 22 Striking a balance between seamless and secure
Best password recovery tool for 2022 By Daniel Blechynden published 2 March 22 In this guide, we take a close look at six of the leading password recovery tools available today.
5 insights into cybersecurity for development of a successful company By Sergey Voynov published 2 March 22 How can cybersecurity professionals develop a successful business?
Why is patch management still so hard to get right? By Greg Armanini published 1 March 22 Why is it hard to get patching right? It's a mix of too little time, too many patches and not enough resources. Here are some suggestions to solve those problems.
More and more UK businesses are facing password security breaches By Sead Fadilpašić published 25 February 22 Significant majority of breached firms believe compromised passwords enabled the incident
How to delete an Amazon account By Chelsea Forsyth published 25 February 22 Spending too much on Prime deliveries? Here’s how to delete an Amazon account.
Ransomware data leaks saw major surge in 2021 By Sead Fadilpašić published 15 February 22 It's all about taking control away from the victim