Why European Cybersecurity Month is more important than ever before

This October sees the arrival of European Cybersecurity Month (ECSM) – and given the events of this year, the campaign has never been more important. Of course, raising awareness of the importance of cybersecurity has always been a top priority, however, this year has seen cyberthreats surging as cybercriminals have sought to capitalize on the fear and … More Why European Cybersecurity Month is more important than ever before

Google will test new feature in Chrome to curb phishing

The web browser will only display domain names as a way to help people recognize impostor websites. Google will test a new feature in the Google Chrome web browser to help people spot websites that aim to trick them into giving away their personal data. The experiment, which will be rolled out on the desktop … More Google will test new feature in Chrome to curb phishing

Small and medium‑sized businesses: Big targets for ransomware attacks

Why are SMBs a target for ransomware-wielding gangs and what can they do to protect themselves against cyber-extortion? According to the World Bank, small and medium-sized businesses (SMBs) play a huge role in most economies, accounting for 90% of businesses worldwide and representing over 50% of employment. These are businesses that range from family-owned restaurants, through … More Small and medium‑sized businesses: Big targets for ransomware attacks

Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe

All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface. In May 2020, Björn Ruytenberg, a computer security researcher at the Eindhoven University of Technology in the Netherlands, announced the discovery of Thunderspy, a series of vulnerabilities in the Thunderbolt technology and interrelated scenarios for changing – including disabling – … More Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe

Positioning your cybersecurity investment for a remote workforce: Tier 3 – Tailor-fit protection for specific business use cases

With a managed network in place in tier two, a lot has been done to secure your endpoints from attack. However, some businesses will need to assess whether the protection that has been achieved thus far is adequate to safeguard business data that has critical value, or is highly sensitive or highly regulated. In the third … More Positioning your cybersecurity investment for a remote workforce: Tier 3 – Tailor-fit protection for specific business use cases