
Why does the Hospitality Sector Roll Out the Welcome Mat for Hackers?
Geraldine HuntHackers are increasingly targeting restaurants and hotels to steal customer card information. Most of these breaches go undetected or unreported. Find out why.
Hackers are increasingly targeting restaurants and hotels to steal customer card information. Most of these breaches go undetected or unreported. Find out why.
The implementation of GDPR will require significant changes to business practices for many organizations who do not have comparable privacy and security measures already in place.
Cybercriminals consider restaurants to be soft targets, often without on-site IT and solid security practices. Bear in mind, 50% of restaurants go out of business within one year of a breach.
March 31 is World Backup Day, an annual reminder that data needs to be protected from things like ransomware, malware, hardware failures, and of course human error.
Restaurants are tough to manage. Most owners aren't IT savvy, but they want to attract more customers using technology.
Cybersecurity for the education sector continues to be a challenge. The sector is increasingly targeted by scammers and cybercriminals, putting students and faculty at great risk.
Famed cybersecurity blogger and former Washington Times reporter, Brian Krebs spoke at the Aruba Atmosphere conference in Nashville, TN last week. It was absorbing!
How we approach technology and network security in our organizations changes year to year and so should our security priorities.
Unfortunately, the year thus far is exceeding expectations after new strains of the malicious malware entitled Popcorn Time and Spora were identified in January.
For law firms providing services to clients, data security must be an important part of business. In this environment the need for effective data security is of critical importance.
It's critical for organizations to be able to access and present emails when required. If your company fails to provide these to aid regulatory compliance, steep fines can apply.
To avoid network security traps follow these tips to keep your organizations’ computers secure.
A new ransomware variant called ‘Popcorn Time’ has been discovered. Hackers have started using a new tactic to spread ransomware by offering victims a pyramid scheme type discount.
2016 was a record-breaking year for data breaches. They range from embarrassing slip-ups to dangerous hacking attacks that are still impacting businesses today.
Healthcare tops the list industries being targeted with intense cyber-attacks. 88% of ransomware attacks during the second quarter of 2016 were directed at health care organizations.
This New Year the first step for IT security Pro’s is to check off the simple stuff that’s often avoided or ignored yet vitally important – the basics!
WiFi has been a natural fit for hotels and coffee houses for years now. For network providers, dedicated guest WiFi brings with it a lot of security concerns.
Implementing a content filter is now crucial for businesses. Social media websites can be a drain on productivity. In terms of security Facebook chat is a particular cause for concern.
Canada has been hit with an increasing number of phishing attacks targeted at high profile companies. With phishing being so prevalent, why don’t more users know about it?
With the average spear phishing attack on large businesses costing 1.6 million dollars in 2016, spear phishing ranks as a top security concern for most organisations.
While the Presidential election process winds down, cybersecurity is now more important than ever.
Here’s a quick insight into the hot industry topics that were on the lips of the speakers, vendors and attendees at WiFi Now London 2016
Our approach to network security can range from overly permissive to delusional paranoia. What level of vigilance is required?
This Halloween, we have a lot more to be afraid of than ghosts and goblins. All companies justifiably fear the unwanted publicity and huge financial burden a data breach brings.
Typosquatting is a method phishers use to capitalize on commonly misspelled domain names. Find out how you can prevent typosquatting attacks.
Security incidents are common occurrences. Establishing good data protection policies will minimize the financial loss of a data breach.
UK Government stepping up the fight against cyber criminals with plans to partner with UK Internet Service Providers to use DNS filtering as a way of curbing cyber-attacks.
TitanHQ will be speaking, attending and doing business at the following events during Q4. If you plan on attending why not arrange a meeting in advance?
Not all web filters can block HTTPS websites. Chrome will soon label all HTTP sites as insecure. For those using a filter that can't block HTTPS this is a problem.
Cybercriminals see law firms as an easy target for phishing attacks. But law firms can significantly reduce their exposure to a phishing attack and potential data loss.
Yahoo hacked with data from 500m accounts stolen. Details include names, passwords, email addresses, phone numbers and security questions.
Students aren’t as worried about data breaches and cyber attacks as they should be, often providing a doorway for hackers to steal sensitive and valuable information.
The bogeyman has morphed; it has become ransomware, holding data hostage for ransom. Here we outline an incident response plan for your business to help deal with the situation.
An exploit is a method of taking advantage of a software or hardware vulnerability. A zero-day exploit is an exploit for which no patch has been issued.
One of the top 'Nigerian prince' email scammers has been arrested. The man presided over a multinational network behind email scams worth more than $60 million.
At HostingCon 2016, we will be meeting potential partners and MSP’s who would like to add web content filtering to their service offering.
Policy and procedure for the use of IoT should be in place before it’s implemented in an organisation. Many organisations fail to have a specific solution in place to...
New survey finds that UK IT security pros don’t realize the problems of data breaches, malware attacks and ransomware are largely caused by malicious emails!
Ransomware attacks are on the rise. Organisations of all types have been impacted by recent ransomware attacks.But why are unfortunate coincidences and ransomware attacks a dangerous combination?
Malware authors are continually modifying their “product”. Originally, ransomware used Microsoft Office documents with malicious VBA scripts. Now any app that runs JavaScript can launch the attack.
Wi-Fi filtering in hospitals ensures guests (and employees) are not accessing unsuitable and malware laden websites. Why would an attacker target a hospital?
Seasoned Silicon Valley IT veteran gives his tips on progressing a career in IT. There may be a nugget or two of wisdom here for the more experienced person too.
The Department of Transport (Ireland) has warned motorists of a motor tax ‘phishing’ scam which is spreading fast. The emails request billing and vehicle details from vehicle owners.
Phishing attackers today do their homework. Of the $2.3 billion lost to phishing scam emails from October 2013 through February 2016, $215 million was attributed to CEO phishing scams alone.
TitanHQ awarded (ITAG) Information Technology Association of Galway Enterprise award for its outstanding contribution as product innovators and a centre of technical excellence.
The risks from spoofed and malicious emails are much greater today. In this article we discuss how email spoofing has evolved as a tool and become a riskier threat.
Recent hospital hacking campaigns in Germany, L.A and Kentucky demonstrate why hospitals are being targeted. Hospital represent a quick but sizable payoff for hackers.
“Locky” ransomware attacks are targeting businesses with malware that encrypts their files. This ransomware is named after its file extension - .locky. Find out how Locky ransomware works.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us