The year ahead: cyber security in 2020
Data is a valuable asset to any company, large or small - therefore it is attractive to cyber criminals who are constantly finding new ways to gain access and abuse data records to make money. Our threat intelligence team recovered an impressive 7.7 billion (7,715,379,868) stolen records from 618 databases this year and as we enter the next decade, cyber attacks are set to increase in complexity and sophistication.
A cyber security checklist for businesses selling online
As sales grow online, criminals take advantage of the upsurge in traffic to eCommerce sites where customers share valuable information such as credit card details, email addresses, home addresses and more. Online merchants therefore need to understand the critical need for website security to protect sensitive data. However, research conducted by Tala Security highlights that 98% of Google Alexa’s top 1000 websites are lacking deployed client-side security measures.
Server misconfiguration can destroy your business
With the massive shift in hacking capabilities, it is crucial to be aware of the threat landscape that is changing and affecting SMEs in more ways than ever. The most common mistake we encounter is poorly managed or entirely unprotected servers; is your business serving data to hackers on a plate?
What is ransomware?
Ransomware is on the rise and wreaking havoc; in recent months US government institutions and universities have hit the headlines after a spate of attacks costing thousands to remedy. But it’s not just the US suffering - according to a study carried out by Databarracks, a third of UK businesses have been hit by ransomware in the past year. So what is ransomware and what should you do if you’re targeted?
Phishing scams: everything you need to know
The first phishing attack was reported in 1996 when criminals contacted AOL customers via email asking them to confirm their passwords. From that moment, phishing scams have improved in sophistication and are one of the most commonly used social engineering scams to date because sadly, they work.
It takes more than complying with GDPR regulations to protect against data breaches
It takes more than complying with GDPR to protect against data breaches
How to identify a malicious website
Malicious websites come in two forms; they host malware or are used to phish for sensitive information, tricking users into revealing sensitive data such as login credentials for online banking websites. But when a website looks legitimate, what should you look out for?
WhatsApp: surveillance software issue may open up a can of worms
WhatsApp – a free messaging service owned by Facebook – recently reported that surveillance software attack had been detected, affecting an unknown number of users. But how did the attack happen in the first place and how will it affect users?