Eskenzi PR ad banner Eskenzi PR ad banner

Insight

INSIDER THREAT AWARENESS MONTH: Are you prepared?

An insider threat can feel a bit like the plot twist in a spy thriller. You know, the moment when the protagonist realises the enemy is not just at the gates but has been inside the house the whole time. Suddenly, all those polite conversations by the water cooler take on a sinister meaning. So, what do you do when your very own corporate narrative takes a turn for the dramatic?   Identifying the Mole...

Read more
business phone systems

Choosing the right business phone system is a critical decision for any company. A good phone system not only ensures effective communication within your team but also enhances your customer service. With so many options available, it can be overwhelming to decide which system is best for your business. To make an informed choice, it’s important to understand what to look for when buying a business phone system. Understanding Your Business Needs Before diving into...

Read more
School Breach

We've all encountered websites that are legitimate, but feel clunky, slow, and frustrating to navigate. A website's first impression directly impacts how users perceive a business's quality and trustworthiness, making it crucial to get it right. However, creating an effective online presence can be a daunting task. Even seasoned professionals stumble upon common pitfalls that can impact user experience and, consequently, a site's success.  With expertise from website design company, Full Stack Industries, we will...

Read more
ransomware

Ransomware attacks are a growing menace. Malicious actors are constantly honing their tactics to exploit vulnerabilities and extort ransoms from businesses and individuals. These attacks can cause significant financial and reputational damage, making it crucial for businesses to stay vigilant. Understanding the signs and common missteps leading to such attacks is vital to strengthening cybersecurity measures. By recognising early warning indicators and addressing security gaps proactively, entities can prevent themselves from falling victim to ransomware....

Read more
NIS2 Directive in the EU: An imminent deadline, insufficient preparation

Dr. Martin J. Kraemer, ​Security Awareness Advocate​ at Knowbe4, gives his advice on where to organisations can start to act now with the impending NIS2 regulation    While EU member states must introduce the Network and Information Systems Directive 2022 (NIS2) into their national law by October 2024, not all appear ready to meet this deadline. This directive imposes ten security measures intended to strengthen the cyber resilience of critical infrastructure, including business continuity management,...

Read more
Expert Insight: Cyber Security Resilience Act: A game-changer for industry standards

For the IT Security Guru, Chris Dimitriadis, Chief Global Strategy Officer at ISACA, explores the UK Government's proposed Cyber Security Resilience Act.  As King Charles III read out the new Labour government’s plans at the State Opening of Parliament, our industry breathed a sigh of relief at the inclusion of the Cyber Security and Resilience Bill. After an attack on London hospitals caused over 1,000 appointments and operations to be delayed, the proposed regulation is...

Read more
data breach

The insurance industry is experiencing a significant transformation fuelled by the ubiquity of digital technologies. As these solutions gain traction in this sector, they add complexity to a regulatory landscape that insurance firms need to navigate, especially when it comes to Customer Identity and Access Management (CIAM). These regulations stress the fair treatment of customers, transparent sales practices, robust governance and consent. For instance, the GDPR emphasises that consent is no longer implied and must...

Read more
wallester

Technology is advancing rapidly and tokenized payment cards are a part of its evolution. Gone are the days of keying in long card numbers, expiry dates and CVV codes and hoping for the best. Instead, tokenized cards offer heightened security and improved transaction processes for digital payments. But what are they all about and how is Wallester leading the way as a pioneering provider of such payment solutions? Let’s find out. What Are Tokenized Payment...

Read more
Effective change management practices in IT environments: a guide

Change is inevitable. IT environments are evolving, being updated and upgraded, modified and modernised, to keep pace with technological advancements and organisational needs. However, if these changes are not managed effectively, all the new technologies in the world will not make a difference because they will not be properly integrated, utilised, and maintained, leading to inefficiencies and resistance among users. Importantly, they will put businesses at risk of data breaches.  After all, malware on a...

Read more
Authy breach exposes data of millions – what to look out for if you use it

The exposure of millions of users’ phone numbers in the recent breach of Twilio's 2FA app, Authy, has serious implications for users, who are now at a significantly heightened risk of phishing attacks and SIM swapping, endangering their privacy and security.  It’s important for users to be vigilant and learn the signs of phishing attacks in order to prevent falling victim to them. #1 Urgent language: Phishing attempts will often contain language that displays a...

Read more
Page 1 of 26 1 2 26