Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

A friend of mine runs a small legal firm and he was the victim of a ransom-ware attack. He decided not to pay and it took him two days to get his server up and running again, and the best part of a week to recreate documents that had not been backed up. It caused him a lot of worry and embarrassment with his clients, and it cost him money to pay for staff over...

Read more

Over the past 20 years, the security industry has focused on technology to solve its complex problems. Yet despite decades of research and the myriad security vendors, products and technological advancements that have emerged year after year, the threat landscape is more active today that it has ever been, with no signs of abating. Why? What critical information has eluded cybersecurity companies and prevented them from stemming the tide of data breaches? At Nuix, we...

Read more

In late 2015, TalkTalk Telecom Group, a telecommunications provider in the United Kingdom, suffered a breach. The breach exposed the details of over 150,000 customers, including more than 15,000 bank account details and 28,000 credit card numbers. The breach cost TalkTalk 42 million British Pounds, cutting the company’s profits for the year in half, and resulted in the loss of more than 95,000 customers. The breach was so significant that the British Government opened up...

Read more

Dear Editor, As the recent Federation of Small Businesses (FSB) study* highlights, the UK’s small businesses are today more at risk of cybercrime than ever before. Yet, the majority lack both the resources and the skills to put in place appropriate protection, resulting in a lack of security with a total annual cost to small business of around £5.26 billion over 2014 and 2015. Voice over Internet Protocol (VoIP) is one of the rising technologies...

Read more

Preparing for GDPR: steps you need to take now Guy Bunker, Senior VP, Products, Clearswift With less than two years to go, the EU General Data Protection Regulation (GDPR) will affect every public and private sector organisation transacting with businesses in the European Union. So far, much of the conversation has focused on the financial penalties that will result from non-compliance. However, instead of viewing the incoming GDPR as tyrannical bureaucracy, organisations should view the...

Read more

Protection against cyberattacks: How to secure your website Author: Elias Rendón Benger, Head of product management 1&1 MyWebsite The website is your organization's most powerful digital touchpoint: You can be found online, can present ideas and offers, provide contact information or sell products. However, in addition to all the benefits, an online presence can also be a risk – for you and for your visitors. We will show you why you should take the protection...

Read more

Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS In my travels around the globe, I am often asked what strides an organisation should take in order to measurably reduce their exposure to cyber threat actors, and their relentless cyber-attacks. Deploying the right security technologies obviously makes good sense. However, no matter how much security technology you deploy, it will never completely replace good common sense. Most cyber-attacks that result in data theft involve the human...

Read more

Why forgetting is good for business  By David Emm, Principal Security Researcher, Kaspersky Lab  A new study reveals that being able to offload information, even just temporarily, onto a digital device is crucial for creativity and innovation in the workplace. It seems that too much data kills our ability to think freely, and that far from making us lazy or dumb, connected devices play a significant supporting role in helping us to clear our brains...

Read more

Small businesses can make common mistakes, which can result in company data leaks. Albie Attias, managing director of IT hardware suppliers King of Servers, explains. As an IT professional, it can be difficult to gain the support of your colleagues and members of management when it comes to rolling out changes that will directly benefit the company - and introducing methods that will improve IT security is no exception. But the number of businesses that are...

Read more

Join AppRiver’s experts Troy Gill, Fred Touchette and Jon French for another close-up on the findings of their Global Security Report. This week, we’re analysing ransomware and what the reality is when you get hit by it. Ransomware has become very sophisticated through the use of different forms of communication, payment and browsing tools that allow criminals to remain off-grid and to carrry on their illegal activities undisturbed. Looking at many of the pieces of...

Read more
Page 50 of 69 1 49 50 51 69