Assessing and mitigating supply chain cybersecurity risks

Blindly trusting your partners and suppliers on cybersecurity is not sustainable – it’s time to take control through effective supplier risk management. The world is built on supply chains. They are the connective tissue that facilitates global trade and prosperity. But these networks of overlapping and inter-related companies are increasingly complex and opaque. Most involve … More Assessing and mitigating supply chain cybersecurity risks

Caught in the web: Understanding and battling internet addiction

The internet is a place of many possibilities. But when the online world starts to take up too much space in your child’s life, it can be an issue. The internet is a remarkable tool that can help us and our children with many activities, from studying to creating to staying in touch with family … More Caught in the web: Understanding and battling internet addiction

Understanding the Power of Managed Detection and Response (MDR) for Small and Medium-Sized Businesses (SMBs)

How an MDR service can enhance the cybersecurity of SMBs The 2022 SMB Digital Security Sentiment Report shows that the majority of small and medium-sized businesses (SMBs) perceive themselves as more susceptible to cyberattacks compared to larger enterprises. These SMBs express concerns regarding the potential consequences of such attacks, particularly emphasizing data loss, financial ramifications, and a … More Understanding the Power of Managed Detection and Response (MDR) for Small and Medium-Sized Businesses (SMBs)

TeamViewer abused to breach networks in new ransomware attacks

Ransomware actors are again using TeamViewer to gain initial access to organization endpoints and attempt to deploy encryptors based on the leaked LockBit ransomware builder. TeamViewer is a legitimate remote access tool used extensively in the enterprise world, valued for its simplicity and capabilities. Unfortunately, according to Bleeping Computer, the tool is also cherished by … More TeamViewer abused to breach networks in new ransomware attacks