
Data Breaches: The Gift That Keeps on Giving in 2021
Trevagh StankardData breaches are extremely dangerous and harmful to organizations and their customers. These attacks will not be declining in 2021.
Data breaches are extremely dangerous and harmful to organizations and their customers. These attacks will not be declining in 2021.
PDF attachments have all been used by hackers. A new code-injection technique extracts sensitive data from PDF files such as payslips and e-tickets.
We discussed xxx domains in a blog post a few years ago - there has been much litigation and controversy since. In this article we revisit the .XXX Domain Controversy...
The WinZip application has been in operation for 30 years but failed to secure the business from a malware attack of a pop-up on the local network.
A phishing scam causing damages of $179 million shows why ignoring cybersecurity can cost an organization more money in the aftermath than the cost to implement it.
TrickBot is a trojan malware that was originally designed to target bank users. Recently, TrickBot has been associated with the distribution of ransomware in order to facilitate infection.
With the sudden increase in remote working in 2020, the rush to provide employees with a workable environment wasn’t thoroughly planned, leading to oversights in relation to cybersecurity.
TA416, a hacking group renowned for their innovative methods of malware delivery, are on the attack again. This latest phishing campaign is complicated, clever, and persistent.
2017 saw a 23.9% increase in cybersecurity incidents involving the healthcare industry with 3,442,7748 records compromised for the year. Why is the theft of millions of health records such a common occurrence?
Discovered in 2014, Emotet has had several iterations to avoid discovery from anti-malware programs. It’s made a comeback in 2020 as a major threat against to organizations.
Email services such as Office 365 are vulnerable to large volumes of credential stuffing attacks. These are highly scaled attacks designed to find the weakest link quickly and easily.
As cybercriminals up their game and use more sophisticated and novel techniques to steal and plunder data and systems, what tools can help an organization fight back?
Zoom Users Beware: New sextortion email scam circulating. This scam is part of the ongoing exploitation of changing working patterns and new modes of collaboration.
Firewalls, access controls, user identity management, and other network fundamentals are all components in good cyber security posture. What’s missing in this list and often overlooked is email cyber...
Administrators must offer a work-from-home environment, but it must be done with cybersecurity as a priority. In a new ThreatPost report, researchers saw a 131% increase in viruses spread across the...
2020 has seen a 30% increase in cyber attacks between the months of July and August when a record 1,746,611 cyber attacks were recorded in a 24 hour period on August 18. This blog looks...
It’s easy to fall victim to phishing attacks targeting collaboration tools like Teams, the phishing page is made to look like the Teams login page. Users who do not...
Phishing is as much about human behavior as it is about technology. Cybercriminals know that tricking users into performing an action can effectively do the hard work for them.
The latest Office 365 phishing scam has three core elements that together make it a cyber-attack that is very difficult to detect and prevent.
Over his 36 year IT career Steve Havert has encountered and overcome many IT security issues. Has ransomware been the most challenging?
Ransomware is one of the worst malware threats in the wild, costing millions in data loss and disaster recovery. Organizations must strengthen defenses as new variants become ever more devious.
Cyber-threats are a 360-degree problem. As such, an enterprise needs to tackle them across all entry points, including web-based attack points.
Palmerworm hackers have been hiding in corporate networks for months. Palmerworm uses a unique approach to tricking users into running malicious content.
DNS-based filtering is vital for the safe provision of Internet access to University students and employees - currently a major target for attack.
To protect Office 365 users we can turn to content filtering technology or more specifically DNS Filtering, but why is it needed, and how can it help?
Keeping employee communications smooth and unhindered has meant that email has taken a central seat at the technology table. How to manage corporate emails to ensure compliance, security, and privacy?
On Tuesday, 22nd September, 2020 we're running an exclusive webinar. Sign up to learn 'How to Ensure Business Continuity with Email Archiving for your Remote Workforce'.
At the start of the pandemic, 40% of MSPs expected to reduce their growth projection by at least 10%. Many MSPs are expecting a 'flat' year.
Cybercriminals are taking advantage of the COVID-19 pandemic and unleashing targeted BEC attacks. Scams are designed to trick victims into transferring data or funds to the scammers.
Defending sensitive data takes the right configurations, but even more important is the right security and detection tools. Cybersecurity should be proactive rather than reactive to avoid major data breaches.
Here's 15 of TitanHQ's Top free resources for system administrators, network admins and managed service providers
In this blog, we provide tips and insights into how MSP’s can thrive, not just survive, during these challenging times.
TitanHQ are in the process of deploying new and vastly improved ArcTitan systems in the EU and US. We will be migrating existing ArcTitan accounts to these systems.
In this article we examine recent research into how MSPs are adapting to COVID-19 and other challenges that so many companies are forced to deal with.
Phishing and social engineering attacks make much more work for MSPs who must detect, contain, and eradicate any malicious activity on a corporate network.
As Zoom and other communication software use increases, hackers find ways to exploit vulnerabilities. Vulnerable conferencing software is just one attack vector that is being used to eavesdrop on data.
On Thursday May 21st join us for an exclusive webinar 'Keeping your Remote Workers TWICE as secure with SpamTitan & WebTitan'. Learn how to protect remote workers from dangerous cyberattacks.
Recent attacks on the oil and gas industries use phishing and spear-phishing techniques. In many cases the attacks launch a dangerous Trojan called Agent Tesla.
Thousands of COVID-19 themed scam and malware sites are launched daily. This article highlights some of the most recent.
The FBI released a Private Industry Notification warning that Kwampirs malware is being used in supply chain cyberattacks on the healthcare industry.
A layer of security during DNS lookups, filters (usually cloud-based) can be added to identify common attack sites and stop browsers from loading malicious content.
Attackers operate by using well-known exploits to hack into vulnerable devices and make changes to the router's DNS configuration, changes that most users won't notice.
COVID-19-Themed email phishing attacks are increasing. Real-time AI driven threat intelligence is finding these new malicious threats as they surface.
During these uncertain times, Irish cybersecurity companies can offer innovative solutions to the challenge of managing a remote workforce.
It is now the job of internal IT to protect users during this time of remote working. They must protect remote workers from malware and phishing attacks during this time.
Remote workers need clear communication from IT on support and security issues. In the rush to provide remote access, don’t sacrifice cybersecurity.
TitanHQ recommends email administrators never pay for blacklist removal. In the sphere of email administration the pay-to-delist model is not well respected or trusted.
The impact of a data breach can last for years. A monetary impact is not required for people to be impacted years down the line.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us