Search the blog:
What happens when an employee downloads a virus onto one of their personal devices that you have allowed access your company systems? Grant McGregor takes a look at an emerging weak spot in many companies’ defences.
Cyber threats are constantly evolving and growing. With breaches reported in the international press, it is easy to get lost in the white noise of cybercrime fear and misinformation. But there are some truly straightforward and clear steps that every business can take.
Most cyber security news recently has focused on the revelation of Russian military intelligence service attacks, but there has been a recent announcement about cyber security practice to which organisations of all sizes including small businesses should be paying much greater attention.
People are often the weakest link of any security infrastructure. Which means the best line of defence when it comes to preventing phishing attacks or other people-focused exploits is to ensure staff are aware of the risks.
We’ve all heard some horror stories: the divorce lawyers trawling your social media accounts, the gift for any would-be stalker that is your Facebook Timeline – but what happens when the dangers of oversharing online cross into the professional realm?
When we discuss cyber-attacks it often refers to those that come from the outside – the ones that are typically high profiles cases, such as malware, hacking, DDOS and ransomware.
This time last year, we were contemplating 2015 as the year of the data breach. We were taking stock and trying to learn the lessons so that we could better protect ourselves and our businesses from the growing threat of hackers. And then 2016 happened.
Your data is vitally important to your business so you need to take every step possible to keep it secure. There is no shortage of malware programs out there that are designed to extort money by interfering with the functionality of your computer and targeting your data. One of the most troublesome...
Today’s desktops, tablets, laptops and android phones are under constant attack from malware and ransomware, and it’s enough to put you on edge, worried about which websites you’ve visited and whether they were safe. How can you use any of devices with confidence? How can you browse for both work...