Most Popular Content – Page 14
- 
      
        
      
      ebookImproving Cybersecurity for Remote Working: 13 Recommendations
What are the security implications of this abrupt change? And which cybersecurity best practices are most critical to make this abrupt change both seamless and secure?
 - 
      
        
      
      ArticleOne in five Europeans have experienced identity theft fraud in the past two years
New research has found over half of Europeans have experienced at least one type of fraud in the last two years.
 - 
      
        
      
      FeaturePreparing for the ‘new normal’ in cyber security
The global coronavirus pandemic has added an enormous strain on employees’ ability to work remotely.
 - 
      
        
      
      WebinarBuilding an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
 - 
      
        
      
      Feature10 ways cybersecurity will evolve in the next five years
Looking back just 10 years, the cyber threat landscape is almost unrecognisable. Back then most IT security threats were unsophisticated malware programs (mostly viruses, worms or trojans) written by people whose main aim was simply to cause trouble.
 - 
      
        
      
      ArticleHackers can bypass Visa card’s contactless limit
Security researchers at Positive Technologies have discovered flaws that could bypass the payment limits on Visa contactless cards.
 - 
      
        
      
      WebinarCyber AI: Supporting Privacy-First Security & Data Compliance
Data privacy is critical in increasingly digitized business environments, where the workforce is dispersed and dynamic, and relies on collaboration platforms, smart devices, and cloud computing.
 - 
      
        
      
      WebinarSolving Your Number One Security Risk
Email has played a growing role in digital transformation during the COVID-19 pandemic, as organisations continue to support large-scale remote working. But it has also introduced risk of accidental and intentional data leakage.
 - 
      
        
      
      FeatureWhy communication is vital during a cyber-attack
Cyber-attacks are a constant threat to organisations. Cloud-based communications platforms can help an organisation improve emergency communications and recover from the effects of a cyber-attack.
 - 
      
        
      
      FeatureThe Cybercrime Trends and Challenges We Have Faced During COVID-19
It should come as no surprise that since the emergence of COVID-19 last year there has been a month on month increase in the level of malicious activities relating to the pandemic, with cybercriminals using it as a new hook to bait their unsuspecting victims. In actual fact, the overall level of cybercrime in general has not increased dramatically, but many threat actors have jumped at the opportunity to switch from existing lures to those relating to COVID-19.
 - 
      
        
      
      Article4,500 successful daily cyber attacks on UK SMEs
An estimated 65,000 attacks are carried out on UK SMEs every day resulting in 4,500 breaches, a report has highlighted.
 - 
      
        
      
      ArticleZoom reveals improved security with 256-bit GCM encryption
Zoom Video Communications has revealed improved security enhancements with 256-bit GCM encryption.
 - 
      
        
      
      WebinarA New and Critical Approach To Protecting Your Data
Most cybersecurity protections are based on looking for, finding, and stopping threats.
 - 
      
        
      
      FeatureInterview: Behind The Great Hack, with David Carroll
Released this summer on Netflix, The Great Hack is a documentary that explores the murky data-sharing relationship between Facebook and Cambridge Analytica.
 - 
      
        
      
      FeatureCan artificial intelligence beat a human hacker?
At some point, we have all completed a captcha to prove we are human when online. So, when a robot successfully completed the test, we were left asking, are our computers secure?
 - 
      
        
      
      ArticleIkea apologises for data breach
The homeware retailer, Ikea, has issued an apology to Singapore-based customers that may have been adversely impacted by a data breach the firm suffered.
 - 
      
        
      
      Article‘Ethical’ hack compromises data of countless online shoppers
Hundreds of thousands of online shoppers have had their personal data exposed in a recent ‘ethical’ hack.
 - 
      
        
      
      ArticleRansomware families launch sites to publish stolen data
Numerous ransomware families are adopting the new tactic of leaking stolen data of non-paying victims.
 - 
      
        
      
      ArticleSuspected scam gadget store tops Google Search results
A suspected scam store, featuring hard-to-find gadgets topped Google search results for days. The site titled ‘MyTechDomestic’ accepted payments via direct bank transfers only, despite indicating support for credit cards and PayPal, and falsely claimed to be owned by a UK-registered company.
 - 
      
        
      
      ArticleSocial housing provider Flagship Group suffers REvil ransomware attack
A provider of social housing based in the UK has suffered a ransomware attack by prolific phishing strain Sodinokibi, otherwise known as REvil.
 









