Eskenzi PR ad banner Eskenzi PR ad banner

Data Protection

JD Sports admits data breach

JD Sports has warned customers that bought items on its website, as well as those of Size?, Blacks and Millets, between November 2018 and October 2020 may have been impacted in the breach. The company has urged customers to be wary of potential phishing emails, calls and texts in the aftermath of the breach, while claiming they were proactively contacting those whose details were confirmed to be stolen. Paul Bischoff, Consumer Privacy Advocate at Comparitech...

Read more
Industry All-Stars Take Stage at International Cyber Expo’s Global Cyber Summit

International Cyber Expo today announced the speaker line-up for its annual Global Cyber Summit sponsored this year by Snyk, and hosted at Olympia London on the 27th and 28th of September 2022. Introduced by former CEO of NCSC, Professor Ciaran Martin CB, the Summit endeavours to be an educational platform for IT professionals, C-Level executives and board members on the issues impacting the industry; both current and emerging.   In a combination of roundtable discussions, fireside...

Read more

If you are on a limited internet plan, it would be wise to monitor your network traffic to know the apps that consume a large volume of data. iOS devices are fast and tend to auto-refresh apps and load high-quality websites and images. These can strain your internet plan and make it finish earlier than expected. Some might think turning off your data connection at every opportunity is an easy fix, but it is not...

Read more
Personal data of 69 million Neopets users exposed

The online pet website, Neopets, has confirmed it fell victim to a data breach, exposing the personal information of approximately 69 million users. The website's source code was also stolen in the attack. Recently, Neopets launched NFTs, which are part of a plan to create an online Metaverse game, in which users can own, raise and play games with their virtual pets. According to reports, the breach occurred on Tuesday and has since been attributed...

Read more
Cybersecurity is complex – but it doesn’t need to be costly or complicated

The pandemic tested the business resilience of every organisation. Small and medium sized enterprises (SMEs) had to maximise their digital footprint to keep operational, service their customers and survive. Just as companies are starting to return to some semblance of new normal, another threat is on the horizon. The pandemic has fuelled an increase in cybercrime that shows no signs of abating. Small and medium sized enterprises caught in the cross hairs The speed with...

Read more

In light of Data Privacy Day, we've reached out to a number of experts for their thoughts on the evolving nature of data privacy, as well as advice for businesses and individuals alike on how they can best protect their data. Lecio De Paula, VP of Data Protection at KnowBe4: "Although the metaverse took all the attention in 2021, some seemingly innocuous privacy accomplishments have been overlooked. In just the past year alone, dozens of...

Read more
Password Security – Now’s the time to get serious

Did you know that over 80% of breaches involve brute force or lost and stolen credentials, and that over 70% of employees reuse passwords at work? Passwords are on your first line of defence against cyber-attacks and won’t be going away any time soon, getting this piece of the puzzle correct is foundational for cyber defence, the protection of your business and its data. Live Demo: Supercharge Your Active Directory Password Policy Join us for a 30-minute live demo...

Read more
Author headshot

Hackers are using weak and stolen credentials in a significant way to compromise business-critical environments. Stealing access to your environment using a known password for a user account is a much easier way to compromise systems than relying on other vulnerabilities. Therefore, using good password security and robust password policies is an excellent way for organizations to bolster their cybersecurity posture. What characteristics make up an effective password policy? Developing an effective reporting structure for...

Read more
Comparitech finds 1 in 5 Google Play Apps for kids violates Children’s Online Privacy Protection Act

Recent research from security and privacy comparison and advice website Comparitech.com, which has looked at children's apps available through Google Play  has found that 1 in 5 breach COPPA rules. Even more worrying is that half of the apps that violate the rules have received a "teacher-approved" badge. COPPA, imposed by the Federal Trade Commission (FTC), enforces a number of requirements on operators of websites or online services that are aimed at under 13 year...

Read more
vulnerability

An information leakage can result in grave consequences. Consider the recent SolarWinds supply chain attack which transpired from the exposure of a critical, and inanely simple, internal password (solarwinds123). In this way, making the recent findings by the Synopsys Cybersecurity Research Center (CyRC) especially troubling. The analysis of over 3,000 popular Android mobile apps showed information leakage to be commonplace. Passwords, user credentials, email addresses and tokens are among the information found. With this information,...

Read more
Page 1 of 8 1 2 8