Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
U2F Security Key Explained: How It Works & Why You Need It
Editorial U2F Security Key Explained: How It Works & Why You Need It

As we are increasingly vulnerable to online crime, a strong password used for a website is no longer considered a sufficient security measure, especially for those handling sensitive data. Even if we use special characters and upper and lower case in the account creation process, we can’t be sure t

Backup: An Essential Process in the New Global Business Environment
Editorial Backup: An Essential Process in the New Global Business Environment

The pandemic has forever changed the way we work, with many organizations resorting to remote working whether they liked it or not. Many businesses underestimated the risks associated with remote working and cloud solutions, with some managers believing they simply needed to train their employees

Cybersecurity: A Key Priority in the Current Geopolitical Context
Editorial Cybersecurity: A Key Priority in the Current Geopolitical Context

Governments and companies around the world are concerned about the growing risks of cyberattacks against their critical infrastructure. The pandemic and the current crisis in Ukraine have intensified cyberattacks as criminals continue to direct their efforts toward leveraging increasingly

Top 10 Pentesting Tools Used by Security Professionals and Ethical Hackers
Editorial Top 10 Pentesting Tools Used by Security Professionals and Ethical Hackers

With cyberattacks on the rise , it’s more vital than ever for organizations to be able to test the strength of their systems. A penetration test or “pentest” is an efficient process when it comes to identifying and exploiting vulnerabilities within the organization’s network environment. But without

Pro-Russian Hacker Groups Are Targeting Ukraine and Its Allies: DDoS Attacks Are at an All-Time High in Q1 2022
Editorial Pro-Russian Hacker Groups Are Targeting Ukraine and Its Allies: DDoS Attacks Are at an All-Time High in Q1 2022

Cybercriminals are continuing to exploit the ongoing crisis in Ukraine. After initial report of increased malicious and scam activity , the Russian invasion in Ukraine led to the largest-ever spike in DDoS attacks. Compared to the first quarter of 2021, the number of DDoS attacks in the first

Understanding the First Vulnerability Discovered in Apple Silicon and Mobile Chips
Editorial Understanding the First Vulnerability Discovered in Apple Silicon and Mobile Chips

Researchers at three universities have unearthed a vulnerability in Apple Silicon used in Macs, iPhones, and iPads. While any vulnerability is a cause for alarm, the researchers state that the risk is “not that bad”. The weakness has been dubbed the “Augury Apple Silicon vulnerability”. Discover wha

Protecting Your System Against Ransomware-as-a-Service Attacks
Editorial Protecting Your System Against Ransomware-as-a-Service Attacks

Ransomware-as-a-Service (RaaS) is a relatively new acronym in IT terminology. Derived from the more common SaaS, PaaS or IaaS, RaaS defines a service that is not only available to ordinary users, but also to cybercriminals. Regardless of the business or industry, organizations should focus on

Has Ransomware Stolen Christmas?
Editorial Has Ransomware Stolen Christmas?

According to Forbes, ransomware has cost organizations $102.3 million per month in 2021 and is expected to have cost the US economy $265 billion by 2031. These staggering figures show that ransomware attacks are extremely detrimental to businesses and organizations across the country—and the world.

Hidden Threats in Cloud Services: How Most Businesses Fail to Protect Sensitive Information Stored in Cloud
Editorial Hidden Threats in Cloud Services: How Most Businesses Fail to Protect Sensitive Information Stored in Cloud

Cloud computing’s mobility and ease of access makes it one of the most convenient choices for any modern organization. While using the cloud, though, companies are becoming more and more susceptible to security threats.  Most Companies Don’t Protect Their Sensitive Cloud Data Almost 40% of orga

How Israel Became the Land of Cybersecurity Unicorns
Editorial How Israel Became the Land of Cybersecurity Unicorns

Israel had seven cybersecurity unicorns in the first half of 2021, and one in three of the world’s unicorns in the field is Israeli. This is the result of ten years of efforts that started with the drafting of a national strategy that saw government supporting initiative and investment in this f

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later