To help you understand how your business can be targeted by hackers and the different types of cyber threats most commonly used, we have put together an easy-to-read guide to the 9 most common types of malware in use today.
Hackers have found a new way to put pressure on businesses that have been subject to a data breach – enlisting their own customers to call for a ransom to be paid. Tech news site Bleeping Computer discovered that one particular ransomware gang, Clop, has sent emails directly to customers, contacts and partners of its victims...
Welcome to our Spring IT Security Update! Considering the Microsoft Exchange patch issues that have recently been in the tech news, in this quarter’s edition, Jamie thought that now would be the ideal time to look at patches in more detail, reminding you of their importance for your business data security.
Companies around the world are becoming more well versed than ever before in the field of cyber security. High-profile data breaches, as well as the laws being introduced to protect customers, mean that organisations large and small have had to learn quickly and implement robust security practices of their own.
To start off 2021, Jamie’s winter update looks at ex-employees and the threats they pose to the organisation they leave behind. He reminds you why it’s vitally important for your business to put a process in place to ensure that one of the most overlooked cyberthreats is contained as quickly as possible.
This year has seen a massive rise in phishing attacks mainly due to staff working from home as a result of the pandemic. However, it’s hard to spot the difference between a phishing email and a totally authentic one. So, from now until the end of December, we are offering your business a FREE baseline test to let you understand how many of your users are potentially high risk.