The 5 most common reasons for corporate data loss

There is no doubt that one of the main assets of a company is the data it stores. Information about customers, employees and finances, among other types of records, should be adequately protected and available whenever they are needed. For this reason, companies that appreciate the value of their data, invest adequate resources into protecting them and recovering them … More The 5 most common reasons for corporate data loss

TalkTalk profits halve following last year’s major cyberattack

The UK-based telecommunications company TalkTalk has seen its profits more than halve, following last year’s “significant and sustained cyberattack”. Profits were down to $20 million compared with $46 million for the same period last year, which has largely been attributed to the financial fallout of the high-profile incident. The cost of the cyberattack, which was … More TalkTalk profits halve following last year’s major cyberattack

SWIFT: We’re not responsible for Bangladesh Bank cyberheist

SWIFT has delivered a strongly-worded statement that rejects the claims made by both Bangladesh Bank and Bangladesh Police’s Criminal Investigation Department over one of the biggest cyberheists in history. The global provider of secure financial messaging services said that claims by the aforementioned, that its technicians are to blame, as reported by Reuters, are “false, … More SWIFT: We’re not responsible for Bangladesh Bank cyberheist

After authentication comes authorisation and access control

In our first post in this series, we talked about authentication: verifying whether someone is who he or she claims to be. In many instances, this is where system administrators call it a day, by giving all verified users equal access to network resources. But there is much to be gained by continuing to apply … More After authentication comes authorisation and access control

Jigsaw and how ransomware is becoming more aggressive with new capabilities

There is no doubt that criminals have found a mechanism in ransomware enabling them to obtain significant benefits with relatively little effort. And the information stored by computers is much more important than we think, although many users only realize this when they lose access. “Jigsaw is an example of the tests that the creators … More Jigsaw and how ransomware is becoming more aggressive with new capabilities