Helen Laidlaw

Helen Laidlaw

IT Systems Analyst
Helen Laidlaw is a tech expert specializing in IT security, networking, and development. Helen provides comprehensive insights into securing digital assets, crafting efficient software solutions, and optimizing network performance. Covering a wide variety of technical topics, she employs an accessible communication style, lending her content as an indispensable resource for anyone trying to navigate the complexities of modern technology.
How Will Microsoft's Windows Upgrades Prevent Future Outages?
Malware & Threats How Will Microsoft's Windows Upgrades Prevent Future Outages?

Rupert Marais, a seasoned specialist in endpoint and device security, joins us today to discuss Microsoft's efforts to strengthen Windows' operational resilience. In the wake of the 2024 global IT outage, Microsoft is preparing significant platform upgrades intended to protect enterprise customers

Are QR Codes the New Frontier for Cybercrime?
Endpoint & Device Security Are QR Codes the New Frontier for Cybercrime?

As society becomes increasingly reliant on technology, QR codes have swiftly embedded themselves into everyday life, bringing both convenience and growing trepidations. Could a simple scan of a QR code unravel your digital security? The Hidden Threat Behind QR Codes The Anti-Phishing Working Group

Ahold Delhaize Cyberattack Exposes Data of 2 Million Plus Individuals
Data Protection & Privacy Ahold Delhaize Cyberattack Exposes Data of 2 Million Plus Individuals

What would you do if your most sensitive data—your Social Security number, health records, and bank account details—fell into the wrong hands? This alarming situation has become a reality for over 2 million individuals affected by a recent significant cyberattack on Ahold Delhaize USA. The company,

Transforming Compliance Into a Strategic Cybersecurity Asset
Endpoint & Device Security Transforming Compliance Into a Strategic Cybersecurity Asset

In today's fast-evolving cybersecurity landscape, organizations grapple with the challenge of maintaining compliance while combating increasingly sophisticated threats. A prevalent pitfall involves equating compliance with protection, which can lead to a false sense of security. With the surge of

Is Phishing Training Failing to Protect Organizations?
Data Protection & Privacy Is Phishing Training Failing to Protect Organizations?

Cyber threats have emerged as a significant concern for organizations globally, with phishing, in particular, being a dominant method employed by malicious actors. Companies have traditionally relied on phishing awareness training to bolster employee vigilance against these deceptive tactics.

Are Misconfigured MCP Servers Opening AI to Cyber Threats?
Security Operations & Management Are Misconfigured MCP Servers Opening AI to Cyber Threats?

Consider a world where cutting-edge artificial intelligence brings both promise and risk. The deployment of Model Context Protocol (MCP) servers in AI ecosystems globally unveils an unforeseen conundrum. Designed to enhance connectivity and significantly broaden AI’s capabilities, they might

ConnectWise Rotates Certificates Amid Security Concerns
Endpoint & Device Security ConnectWise Rotates Certificates Amid Security Concerns

In recent developments, ConnectWise has announced plans to rotate all code-signing certificates for its software platforms, including ScreenConnect, ConnectWise Automate, and ConnectWise RMM. Scheduled for June 13, this move comes on the heels of a nation-state attack disclosure, though the company

Trend Analysis: Cybersecurity in Cryptocurrency Theft
Malware & Threats Trend Analysis: Cybersecurity in Cryptocurrency Theft

As the digital landscape evolves, cryptocurrency theft emerges as a daunting adversary, capturing headlines with alarming frequency. The virtual currency, once seen as a bastion of financial innovation, now wrestles with security vulnerabilities. This burgeoning threat impacts individuals and

Can LapDogs Network Evade Your Cyber Defenses?
Endpoint & Device Security Can LapDogs Network Evade Your Cyber Defenses?

Imagine your organization's cybersecurity measures—a fortress of firewalls and intrusion detection systems. But what if a new breed of cyber threats quietly slips through this digital DMZ? The evolution of cyber threats has introduced silent infiltrators like the LapDogs network, which could

NHS Faces Major Cybersecurity Breach and Recovery Challenges
Security Operations & Management NHS Faces Major Cybersecurity Breach and Recovery Challenges

The cybersecurity landscape for healthcare organizations, particularly National Health Service (NHS) Professionals, has come under scrutiny due to a significant breach that occurred in May 2024. NHS Professionals, a key provider of temporary staff to NHS trusts across England, experienced a major

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later