Eskenzi PR Eskenzi PR

Insight

Nigel Thorpe

For millions, work used to be somewhere you go. Now it's something you do. From an IT point of view, being unable to control the security of the remote working environment is a significant concern. The employee now sits at home on their laptop, connecting to business servers and applications through virtual private networks, remote desktop or using the cloud. This is all within the control of the IT security team. However, what processes are...

Read more
Author headshot

Companies are under siege. With attackers growing ever more creative, many security vendors are assembling a laundry list of cybersecurity solutions in response. Businesses have at their fingertips a variety of vendors to choose from – each offering top-of-class solutions that should leave attackers ruing the day. But how do IT teams navigate the complex landscape of multiple vendors and tools? Even before the COVID-19 pandemic the enterprise cybersecurity landscape was dominated by chaos and...

Read more
Brian Foster Insight

Phishing and ransomware are inextricably linked. Phishing is the number one delivery mechanism for getting malicious exploits, including ransomware, into mobile devices. According to MobileIron’s latest research, 60% of IT decision makers agree that phishing is the most significant threat faced by their organisation. Advanced persistent threat actors are now chaining sophisticated exploits to not only grab user credentials, but also redirect victims to phishing websites where they could unknowingly download malware onto their mobile...

Read more
Author headshot Rick Goud

With data protection regulations evolving worldwide and the Brexit transition period ending in less than five months – impacting both the GDPR and DPA – now is the time for organisations to future-proof their communication security. Doing so will not only ensure continuous data privacy compliance, it will also help to avoid financial penalties through non-compliance, dissatisfied customers (leading to possible customer churn) and damaged reputation. A critical early step is to reduce, if not...

Read more
Tony Pepper Header Insight

Data loss prevention (DLP) solutions have failed – but it’s an important truth that we need to accept.   Legacy DLP solutions have failed to stop data breaches from happening.  Why? Because they simply can’t cater to the changes that have happened over the last decade to the way sensitive data is created, stored and (most importantly) shared. These changes have introduced new risks that it’s impossible to properly mitigate using older, static DLP solutions. That’s because...

Read more
Sama Deena

As people found solace within the safe boundaries of their homes after Coronavirus caused havoc worldwide, it was a time for hackers to be active. According to a report by NexusGuard, a whopping 542 percent  jump in DDoS attacks was reported in the first quarter of 2020 over the previous quarter. People were forced to work from home to stop the rise of the pandemic. As the reliance on remote services increased, hackers deemed it...

Read more
Curtis Preston Insight

For many of us, the last time we were physically together in an office was in early March. That’s nearly half a year ago. In that time, we’ve battled with the challenges of remote working, the strain on the economy and the biggest challenge of all, the health implications of this pandemic. Perhaps a less obvious challenge that businesses have faced is the increased threat of cyberattacks. The cybersecurity landscape has shifted significantly over the...

Read more
Ben Hartwig

by Ben Hartwig, web operations director at InfoTracer.  Account takeover (ATO) is a form of online identity theft that occurs when a fraudster gains unauthorised access to someone else’s account like a bank account, loyalty account, or e-commerce account, changes information such as login credentials or the email address associated with the account and then makes unauthorized transactions by using the hacked account. In the height of the COVID-19 crisis, all forms of fraud are...

Read more
The cybersecurity mindset: think like a pro

by Dr Amel Bennaceur, lead educator Cyber Security Operations microcredential, FutureLearn.com; academic in Computing at the Open University As our reliance on digital, connected devices increases, so does our need for security. Secure systems must provide the necessary capabilities to protect assets from harm. These systems rely on an explicit definition of their security requirements to describe precisely which actions in a system are allowed and which ones are prohibited. Once security requirements are specified,...

Read more
Allen Able author

by Allen Abel, VP of AMS, Syntax Remote work exacerbates IT challenges for internal teams already stretched thin, but Applied Managed Services (AMS) can provide some relief. As the coronavirus continues to strain economies and businesses worldwide, IT executives now expect a 4% decrease in IT budgets in 2020. At the same time, companies are tasked with supporting fully remote workplaces, which require the right tools, software and security to ensure organisations’ fragile infrastructure is...

Read more
Page 7 of 8 1 6 7 8