Category: Featured

Email security, Featured

Why Phishing Is Still Your Number One Security Foe

April 3, 2018

Via: James Hughes

91% of cyberattacks start with a phishing email. Why are they still so prevalent – and successful? It seems like every day another high-ranking employee falls for a scam and loses millions in company money. How long have security experts […]


All You Need to Know About the Data Protection Officer

March 16, 2018

Via: Michael Boyd

The EU’s General Data Protection Regulation will take effect in May 2018. The Regulation governs the privacy practices of any company processing EU citizens’ data, whether or not that company is located in the EU. One of the GDPR’s requirements […]


4 Common Ways Your Employees Can Compromise Your Security

March 1, 2018

Via: William Palmer

Even though cybersecurity solutions are becoming increasingly sophisticated, hackers are still managing to keep up even with the most advanced technologies. Furthermore, companies get so caught up in trying to adopt new technologies in their endless search for 100% protection […]


Combatting the Growing Threat of Ransomware

February 14, 2018

Via: itCurated

Given the current cybersecurity environment and the increasing sophistication of ransomware, getting to threats before they can have a business impact is more important than ever. If you find yourself questioning whether to pay a ransom, you’ve already lost the […]


How to Safeguard Your Mac from Malware

January 26, 2018

Via: Sofia Allende

You think your Mac is safe from malware? Think again. While Macs do have some integrated protection against malware, they can still get infected. The good news? According to, “even as Trojan Horses, adware, and other types of malware […]


The Makings of a Great Incident Management Process

December 20, 2017

Via: Michael Boyd

The importance of incident management is increasing. We’ve gotten to the point where every company, regardless of size, needs to have a proper Incident Management Process implemented. Why is it so important?   Simply because no one is exempt from […]


5 Types of Highly Effective Hackers & How to Avoid Becoming Their Target

November 24, 2017

Via: Sofia Allende

Are cyber-threats keeping you up at night? You are not alone, dear reader. As hackers have become more skilled, there has been a rise in the number, severity and sophistication of cyber-attacks inflicting organizations of all sizes, all around the […]


Passwords & Email Accounts: a Gateway for Hackers

October 25, 2017

Via: Sofia Allende

“If you spend more on coffee than on IT security, you will be hacked. What’s more, you deserve to be hacked.” – Richard Clarke While the former National Coordinator for Security for the United States does make a valid point […]


Information Security Spending Is Growing. What Businesses Need to Know

September 10, 2017

Via: Jeremy Corkwell

The cybersecurity market continues its steady growth, with a 7 percent increase in 2017 – $86.4 billion, and going up to $93 billion in 2018, according to Gartner’s latest forecast. But information security is just part of the larger cybersecurity […]

Featured, Malware

RaaS for loan for whomever is after your data

August 10, 2017

Via: Russel Edwards

Ransomware as a service, (RaaS), lets malicious parties use predefined malware, in order to extort their victims of choice. Available online, these cyber crime – to lease – deals are making the digital environment even worse. So far, only those […]