
TitanHQ Cyber Security Predictions for 2016
Geraldine HuntWith much outcry to regulate not only the Internet, but company networks and databases in the wake of recent data breaches. Can predictions about possible attacks help us prepare for 2016?
With much outcry to regulate not only the Internet, but company networks and databases in the wake of recent data breaches. Can predictions about possible attacks help us prepare for 2016?
2015 was a big year for data breaches. These attacks targeted a range of industries including Government, Healthcare and Banking. There are lessons to be learned. Can we learn from these...
The availability of guest Wifi in a retail or services businesses is now expected. The number of internet enabled smart phones and tablets grows daily and users expect reliable secure...
A criminal named Hacker Buba demanded a $3 million ransom from UAE bank which the bank refused to pay.
The weekend from 'Black Friday' through to ‘Cyber Monday' are the busiest four days of the year for online shopping . Expect to see a rise in the number of phishing...
In many cases, there is no “smoking gun” that proves a data breach is underway. However, by piecing together the clues discussed in this article, you can be pretty sure...
What are the practical security implications of implementing honeypots? Remember that a honeypot is a highly flexible tool with many different applications to security.
When the clouds of security disaster are darkest, and the storm of helpdesk tickets is raging at its highest pitch, you must steel yourself and rise to the occasion and...
Free Wi-Fi at hotels has become as expected as hot water. We have an expectation of free Wi-Fi in lots of places but mostly don't know or care if that...
TitanHQ warns of a new email scam that attempts to trick users into believing the email is from London City Police luring them into opening an infected attachment. The email...
This latest phishing scam is a fake claim that a person’s Netflix account is in danger of being cancelled. The email asks the target to visit a bogus URL...
The recent breach of cheating site Ashley Madison, resulted in the leaking of data related to more than 30 million accounts. This now public data about its subscribers represents a fertile...
Insiders are defined as present or former employees, contractors, or business partners. Edward Snowden was an insider when he leaked NSA secrets. The threat from insiders is very real.
Kaspersky Labs is being accused by several anonymous former employees of creating fake malware so that competing anti-virus products would flag false positives and be discredited. When it comes to...
The term archive has a technical meaning. It’s a collection of information that is permanently ediscovery, email archiving, network security stored and unalterable. Archives are necessary for all businesses ...
To a cash-strapped SMB, security seems like a frill, not a necessity. But an incursion can be lethal to a firm’s survival. In a previous article, we discussed how...
No matter what email server or spam filter you’re using, there are a few quick and easy things you can do to reduce spam and related malware attacks on...
A black hat is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain".
As one of the most popular professional online networks, LinkedIn is being used by scammers to amass data for future phishing and identity theft type attacks. Once the data is...
Small and medium-sized businesses (SMBs) have the same kind of tantalizing data as their email security larger cousins. There are plenty of attackers looking for credit card info and email...
In this first article we discuss the implication of risky browsing habits. The big shift that’s occurred over the past three years is a result of significantly increasing volume...
A business is subject to legal requirements mandating specific measures to safeguard the confidentiality, integrity, and availability of data. Lack of compliance can lead to fines and civil, and sometimes...
The Carbanak attack is considered by many to be the most sophisticated attack the world has seen in terms of the tactics and methods the cybercriminals used to remain covert.
Many IT professionals worry about the potential of a hacking attack but the really savvy IT people know that by securing their internal data they are also protecting against a...
Consider this scenario. An attacker has penetrated your firewall. What is to stop him/her from compromising your entire network? This is the rationale for defense in depth.
You've just received a report from your hosting provider or a third party that your site is hosting phishing content. While your first instinct may be to remove the files,...
A staple of the System Administrators network security toolbox, honeypots can provide companies with unique benefits. For those who might not be familiar with the term, a honeypot is a...
The CBS television show Scorpion introduces us to Walter, who was arrested as a child for hacking into government computers. He is the villain in the series, right? No, not...
TitanHQ (formerly SpamTitan Technologies) climbs the ranks of hottest cybersecurity companies in the world. Cybersecurity Ventures has announced the Q2 2015 edition of the Cybersecurity 500 list. The list is a global...
No doubt about it, entering (and administering) usernames, and passwords is a hassle. The Google Authenticator and Yahoo’s on-demand passwords have presented some promising alternatives, but they are not...
Yes you need to have a password management strategy, one that ensures you create safe and secure passwords.The number of leaked email addresses and passwords exploded in 2014. Lots of...
If your Facebook account has been hacked, you can report it here . You should know that if this happens, it’s really your own fault. It would not have been...
Windows, Ubuntu, and iOS all have security issues and need to be patched constantly making patch managment vital for network security. As one security issue is found, security researchers find...
Irish security firms were noticeably lacking from the latest Cybersecurity 500 , a recently set up global listing of the “hottest” firms in the cybersecurity sector. So far, only two companies come...
Carbanak cybergang steals $1bn from 100 financial institutions worldwide. The starting point of this attack was spear phishing emails sent to employees. With phishing emails in 2014 up 3X on the previous...
According to a recent Kaspersky report the percentage of phishing emails in 2014 grew threefold from the previous year and accounted for 0.0071% of all email traffic. Their IT Security Risks survey 2014...
You’re responsible for keeping a business and its customers secure—it’s your job—but management simply isn’t willing to commit to providing adequate funding. Getting management to...
Want to be more productive and make your life easier?. That's what this System Administrators Guideto LDAP is all about.
Unfortunately, 2014 was another challenging year for IT security professionals. In January everyone was still reeling from the Target breach, but as 2014 dawned there were immediately breaches announced that were so...
Is your company network security poised and ready for the annual shopping fest that is thanksgiving weekend? As discount codes do the rounds and employee email inboxes fill with Black...
There are a few good reasons why cloud computing has become so popular and prevalent. Beyond the obvious reduction in IT costs, there is the reduced responsibility for housing one...
Many people believe only regulated businesses have to preserve emails and other digital files – this is a dangerous misconception. Data retention laws affect most businesses , regardless of whether they’re...
Do you need to archive your emails? If you have a business, the answer is yes. There can be legal ramifications to getting rid of the wrong data. Too many...
When we think of malware infiltrating a computer network, stealing information, turning infected computers into an army of slaves, we usually think of business or home computers, but computers are...
The word “phishing” comes from the slight variant of “fishing” and is pronounced in the same way. It is the act of pretending or impersonating a person or organization with...
Russian hacker group stole a billion stolen Internet passwords.The number of compromised records isn’t the only unbelievable thing about this latest theft.
Today SpamTitan Technologies announced the company’s email security solution has earned the VBSpam+ certification from Virus Bulletin, a leading security industry test. This is SpamTitans 28th consecutive Virus Bulletin...
Change your eBay password. Probably many of us sigh ‘Another password change?’, 'Another data breach?'. 233 million customers affected.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us