Know Your Data

What do you need to know about your data? More than you think. All of the data and information in your business can give you insight on levels and sources of risk, plus highlight...

The Impact Of Usability On Phishing: Prevention Effectiveness

Phishing emails can take many forms; from massive email blasts valuing quantity over quality, to spear phishing and Business Email Compromise (BEC) attacks custom-tailored to maximize probability of success. Regardless of form, all phishing...
Fitness trackers

4 Things You Didn’t Know About Fitness Trackers and Security

Smartwatches, trackers and fitness trackers can expose networks if they are not properly connected and managed. What and how much security risk activity trackers pose to IT? Well, more than you might think. Hackers target...

The Four Most Serious Threats Facing Online Businesses In 2018

Online crime will cost businesses $2 trillion in 2019. SME’s can’t afford to ignore the risk posed by DDoS attacks, ransomware, phishing, and cryptojacking. Businesses can’t afford to ignore online crime. The average cost of...
Insurance Policies

Comparing Cyber Insurance Policies

Cyber coverage is a growing area of business for the insurance industry. Originally the market for this coverage was limited to a handful of Lloyd’s syndicates and specialty insurers, but now the number of...
ransomware attack

Local Backups May Not Keep Your Business Safe From Ransomware

In the last few years, a series of devastating ransomware attacks has cost businesses billions of dollars. Ransomware doesn’t discriminate: businesses of all sizes have been hit hard, but smaller businesses are disproportionately affected...
Business Travelers

Cyber Security Tips For Business Travelers

It doesn’t matter whether you are travelling the world to ‘find yourself’ or you are on a business trip from NY to London for a big meeting. All types of travelling can pose various...
Cryptocurrency exchanges

Cryptocurrency exchanges – Simple tips to avoid losing your funds

2018 was a bad year for the cryptocurrency industry as a whole. Besides weathering the crypto winter which saw cryptocurrency prices hit multi-year lows, the industry also had record-breaking amounts stolen from...
ransomware

The Perfect Storm Driving The Growth Of Ransomware

Ransomware is an increasingly growing cybersecurity threat. This variation of malware allows an attacker to take control of devices, such as personal computers or servers and encrypt the user or system data on these...
Arduino

Arduino in Education and R&D (What is Arduino)

The Arduino has become one of the most successful open hardware projects of all time. Thus today we want to give you a little overview of it and its ecosystem. What is an Arduino? An Arduino a...
209FansLike
0FollowersFollow
2,559FollowersFollow

More Articles