Why cloud security is the key to unlocking value from hybrid working

How can companies and employees who start to adapt to hybrid working practices protect themselves against cloud security threats? When government lockdowns forced workers to stay home en masse for much of 2020, one technology was there to pick up the pieces. Without the three main cloud computing models, software-, platform- and infrastructure-as-a-service (SaaS, PaaS and IaaS, … More Why cloud security is the key to unlocking value from hybrid working

On course for a good hacking

A story of how easily hackers could hit a hole-in-one with the computer network of a premier golf club in the UK. Golf clubs and cybercrime couldn’t really sound further apart, but when it comes to cybersecurity, businesses of all sizes are targets and their owners must never assume anything is completely watertight. Golf is, however, more associated with business, so when I was recently asked to investigate and test the cybersecurity of an … More On course for a good hacking

Watch out for these scams targeting Amazon customers

Most people are fans of the convenience Amazon brings to online shopping, and that’s precisely what cybercriminals are betting on. Amazon is the largest online marketplace in the world boasting over US$386 billion in revenue in 2020 with 200 million subscribers to its Amazon Prime service just in the United States. And that’s just a … More Watch out for these scams targeting Amazon customers

Most Twitter users haven’t enabled 2FA yet, report reveals

Twitter’s transparency report revealed that users aren’t quick to adopt 2FA and once they do enable it, they choose the least secure option. According to the data shared by Twitter in its recently released transparency report, the popular social network’s users are reluctant to adopt two-factor authentication (2FA) to bolster their account security. In fact, the report paints … More Most Twitter users haven’t enabled 2FA yet, report reveals