Eskenzi PR ad banner Eskenzi PR ad banner

Insight

Brian Foster Insight

Phishing and ransomware are inextricably linked. Phishing is the number one delivery mechanism for getting malicious exploits, including ransomware, into mobile devices. According to MobileIron’s latest research, 60% of IT decision makers agree that phishing is the most significant threat faced by their organisation. Advanced persistent threat actors are now chaining sophisticated exploits to not only grab user credentials, but also redirect victims to phishing websites where they could unknowingly download malware onto their mobile...

Read more
Author headshot Rick Goud

With data protection regulations evolving worldwide and the Brexit transition period ending in less than five months – impacting both the GDPR and DPA – now is the time for organisations to future-proof their communication security. Doing so will not only ensure continuous data privacy compliance, it will also help to avoid financial penalties through non-compliance, dissatisfied customers (leading to possible customer churn) and damaged reputation. A critical early step is to reduce, if not...

Read more
Tony Pepper Header Insight

Data loss prevention (DLP) solutions have failed – but it’s an important truth that we need to accept.   Legacy DLP solutions have failed to stop data breaches from happening.  Why? Because they simply can’t cater to the changes that have happened over the last decade to the way sensitive data is created, stored and (most importantly) shared. These changes have introduced new risks that it’s impossible to properly mitigate using older, static DLP solutions. That’s because...

Read more
Sama Deena

As people found solace within the safe boundaries of their homes after Coronavirus caused havoc worldwide, it was a time for hackers to be active. According to a report by NexusGuard, a whopping 542 percent  jump in DDoS attacks was reported in the first quarter of 2020 over the previous quarter. People were forced to work from home to stop the rise of the pandemic. As the reliance on remote services increased, hackers deemed it...

Read more
Curtis Preston Insight

For many of us, the last time we were physically together in an office was in early March. That’s nearly half a year ago. In that time, we’ve battled with the challenges of remote working, the strain on the economy and the biggest challenge of all, the health implications of this pandemic. Perhaps a less obvious challenge that businesses have faced is the increased threat of cyberattacks. The cybersecurity landscape has shifted significantly over the...

Read more
Ben Hartwig

by Ben Hartwig, web operations director at InfoTracer.  Account takeover (ATO) is a form of online identity theft that occurs when a fraudster gains unauthorised access to someone else’s account like a bank account, loyalty account, or e-commerce account, changes information such as login credentials or the email address associated with the account and then makes unauthorized transactions by using the hacked account. In the height of the COVID-19 crisis, all forms of fraud are...

Read more
The cybersecurity mindset: think like a pro

by Dr Amel Bennaceur, lead educator Cyber Security Operations microcredential, FutureLearn.com; academic in Computing at the Open University As our reliance on digital, connected devices increases, so does our need for security. Secure systems must provide the necessary capabilities to protect assets from harm. These systems rely on an explicit definition of their security requirements to describe precisely which actions in a system are allowed and which ones are prohibited. Once security requirements are specified,...

Read more
Allen Able author

by Allen Abel, VP of AMS, Syntax Remote work exacerbates IT challenges for internal teams already stretched thin, but Applied Managed Services (AMS) can provide some relief. As the coronavirus continues to strain economies and businesses worldwide, IT executives now expect a 4% decrease in IT budgets in 2020. At the same time, companies are tasked with supporting fully remote workplaces, which require the right tools, software and security to ensure organisations’ fragile infrastructure is...

Read more
How to choose a SAST tool to secure your development?

When it comes to secure development, how do you integrate a code scanner into the process, what are the traps and pitfalls? Аll developers face static analysis (static application security testing or SAST, which means code analysis without execution). However, we still rarely see full-fledged SAST solutions in use capable of detecting advanced vulnerabilities. Well-known open-source tools often cannot cope with this task just because they focus on another area (bugs and simple vulnerabilities). A...

Read more
The UK’s exposure & resilience to cyberattacks

The interconnected world provides us with untold opportunities and conveniences. From shopping online to e-banking to something as simple as ordering a pizza, all made possible by the internet. However, these conveniences do not come risk-free, the internet also has a darker side. It is predicted that cybercrime could cost the global community up to £5.4 trillion annually by 2021. However, not every part of the world is equally exposed to cyberattacks, which then poses...

Read more
Page 22 of 23 1 21 22 23