Top

Category: Featured


Featured

Smart Tech: Why Device Owners Must Take Security into Their Own Hands

July 26, 2018

Via: William Palmer

The growing array of devices that can be connected to the internet causes consumers to be increasingly susceptible to cybercrime. Every smart TV or networked lightbulb we set up in our home or office can become a silent soldier sent […]


Featured

Keep Your Device Safe by Mastering App Permissions

June 15, 2018

Via: James Hughes

With the cyber threats faced by mobile phone users uprising at an alarming rate, app permissions became a crucial step in securing our devices. In 2017, Kaspersky Lab detected almost 6 million malicious installation packages and more than 94.000 mobile […]


Featured

Vulnerable or Not? How Your Employees Respond to Cyber Threats

May 18, 2018

Via: James Hughes

With the risk of a cyberattack now being classified as the top threat to organizations, companies all around the globe are still hesitant to spend money to improve their security systems or train their employees. Security threats can put an […]


Featured

4 Common Ways Your Employees Can Compromise Your Security

May 2, 2018

Via: William Palmer

Even though cybersecurity solutions are becoming increasingly sophisticated, hackers are still managing to keep up even with the most advanced technologies. Furthermore, companies get so caught up in trying to adopt new technologies in their endless search for 100% protection […]


Email security, Featured

Why Phishing Is Still Your Number One Security Foe

April 3, 2018

Via: James Hughes

91% of cyberattacks start with a phishing email. Why are they still so prevalent – and successful? It seems like every day another high-ranking employee falls for a scam and loses millions in company money. How long have security experts […]


Featured

All You Need to Know About the Data Protection Officer

March 16, 2018

Via: Michael Boyd

The EU’s General Data Protection Regulation will take effect in May 2018. The Regulation governs the privacy practices of any company processing EU citizens’ data, whether or not that company is located in the EU. One of the GDPR’s requirements […]


Featured

Combatting the Growing Threat of Ransomware

February 14, 2018

Via: itCurated

Given the current cybersecurity environment and the increasing sophistication of ransomware, getting to threats before they can have a business impact is more important than ever. If you find yourself questioning whether to pay a ransom, you’ve already lost the […]


Featured

How to Safeguard Your Mac from Malware

January 26, 2018

Via: Sofia Allende

You think your Mac is safe from malware? Think again. While Macs do have some integrated protection against malware, they can still get infected. The good news? According to SecureMac.com, “even as Trojan Horses, adware, and other types of malware […]


Featured

The Makings of a Great Incident Management Process

December 20, 2017

Via: Michael Boyd

The importance of incident management is increasing. We’ve gotten to the point where every company, regardless of size, needs to have a proper Incident Management Process implemented. Why is it so important?   Simply because no one is exempt from […]


Featured

5 Types of Highly Effective Hackers & How to Avoid Becoming Their Target

November 24, 2017

Via: Sofia Allende

Are cyber-threats keeping you up at night? You are not alone, dear reader. As hackers have become more skilled, there has been a rise in the number, severity and sophistication of cyber-attacks inflicting organizations of all sizes, all around the […]