Why are SMBs a target for ransomware-wielding gangs and what can they do to protect themselves against cyber-extortion? According to the World Bank, small and medium-sized businesses (SMBs) play a huge role in most economies, accounting for 90% of businesses worldwide and representing over 50% of employment. These are businesses that range from family-owned restaurants, through … More Small and medium‑sized businesses: Big targets for ransomware attacks
All you need to know about preventing adversaries from exploiting the recently disclosed vulnerabilities in the Thunderbolt interface. In May 2020, Björn Ruytenberg, a computer security researcher at the Eindhoven University of Technology in the Netherlands, announced the discovery of Thunderspy, a series of vulnerabilities in the Thunderbolt technology and interrelated scenarios for changing – including disabling – … More Thunderspy attacks: What they are, who’s at greatest risk and how to stay safe
With a managed network in place in tier two, a lot has been done to secure your endpoints from attack. However, some businesses will need to assess whether the protection that has been achieved thus far is adequate to safeguard business data that has critical value, or is highly sensitive or highly regulated. In the third … More Positioning your cybersecurity investment for a remote workforce: Tier 3 – Tailor-fit protection for specific business use cases
The going prices are lower than you probably think – your credit card details, for example, can sell for a few bucks. It’s no news that the dark web is rife with offers of stolen data that ranges from pilfered credit card information and hijacked payment services accounts to hacked social media accounts. Anyone interested … More How much is your personal data worth on the dark web?
Practising good cyber hygiene is a critical part of staying safe online and protecting yourself from threats such as malware, phishing, viruses, and data loss – and it doesn’t just apply to your desktop or laptop. Our phones hold a vast amount of our personal and professional data, so it’s vital that cyber hygiene practices … More Take 5: Essential steps to improve your mobile cyber hygiene