
New Surge in Password Stealing Attacks & How You Can Protect Yourself
Trevagh StankardThere has been a recent surge in password-stealing malware. Here's what you need to know about such attacks and how to prevent them.
There has been a recent surge in password-stealing malware. Here's what you need to know about such attacks and how to prevent them.
TitanHQ has announced the acquisition of global leader in security awareness & mitigation of human cyber risk, Cyber Risk Aware. The acquisition brings new a product, SafeTitan - Security training solution.
Most Systems Administrators do an excellent job; however sometimes, under pressure, mistakes happen. We have devised a target list of things for IT system admins to avoid at all costs.
Government and Universities were among the worst hit with ransomware attacks this year. Here's what you can do to prevent phishing and malware.
It’s relatively easy to protect against spoofed emails it’s still a common technique used by spammers and cyber-criminals. It does take some effort to combat email spoofing.
Protecting your computer network from attack requires a combination of technology, good practices and vigilance. Sadly most IT security professionals pay little attention to securing the DNS layer.
The OFAC issued an advisory warning to organisationw on the legal challenges of paying a ransom fee. Here is what you need to know to avoid legal action.
Attackers on a public Wi-Fi network have numerous ways to steal data. The most common in a man-in-the-middle (MitM) attack.
School systems are a major target for ransomware attackers because they often have public funding to pay a ransom and many schools lack the sophisticated cybersecurity infrastructure to fight malware.
TLS is a security protocol developed specifically to protect data that is transmitted over an internet connection, e.g. email.
The best way to reduce the risk of data loss via email is through email encryption, meaning only the intended recipient can access the email.
MSPs are required to implement services required by the customer, but it’s a mistake to skip email security even if the customer claims it’s not necessary.
A new ransomware variant has emerged, known as Lapsus$. The hacking group behind Lapsus$ targets victims with phishing emails to deploy ransomware. Learn more about Lapsus$ and how it works...
In this blog we've outlined some of the most prevalent dangers that your organization faces from a phishing attack and how to combat them.
A research team found a total of 226 potential security vulnerabilities in nine of the more popular WiFi routers in production today.
Before structuring a cybersecurity plan, MSPs must identify threats and then audit infrastructure for risks. Discover proactive tips to help your protect your MSP clients from ransomware attacks.
In March of 2021, a new ransomware technique called RTF Template Injection was discovered. Since then, it has been adapted by several nation state actors. It is anticipated that its use...
Crypto trading platform Bitmart announced they were the victims of a large scale security breach in which close to $200 million of crypto currency was stolen by hackers.
A warning was issued to the healthcare sector on the rise of cyber-threats targeting the healthcare providers to steal sensitive patient data. Discover healthcare attacks of 2021.
Keyword encryption is an automatic encryption policy that ensures all emails are encrypted based on a set of keywords defined by the systems administrator. Learn more about keyword encryption.
On December 9, 2021, Apache disclosed CVE-2021-44228 , a remote code execution vulnerability affecting the Apache Log4j2.
Business emails often contain important and sensitive information that in the wrong hands can cause financial losses, embarrassment, and loss of customer trust in your company. Learn more here.
Discover the easy way to deliver an effective Internet filtering service to clients by speaking with us today about DNS-based content filtering.
Cybercriminals manipulate URLs to redirect traffic to malicious websites to install malware. Discover how to protect your DNS later from malicious URLs.
There are many ransomware strains and variants that can cause result in major damage to your business. Take a look at the most recent ransomware strains and variants.
Technology and attack vectors constantly change, making it even more important for a Managed Service Provider (MSP) to adapt to the evolving cyber landscape. Flexibility is the key to successful...
Password stealing incidents that involve malware known as Trojan-PSW, has increased by 45% over the last 6-months. Here are the best practices to prevent password stealing success.
Cybercriminals are always looking for new attack methods. In this latest phishing technique, threat actors are targeting users with popular brands offering money or gifts in exchange for their information.
The supply chain is a vital enabler of business across the globe. Supply chain security attacks are becoming too common, discover the latest trends.
More than 90% of malware is still delivered by email. 6.95 million new phishing and scam pages were published on the internet in 2020. This article discusses how MSPs can protect their customers...
Cybercriminals are always funding new ways to target victims with phishing scams. Find out the latest phishing scams in this article and how a layered security defense will protect your...
A zero-trust model assumes all users and services could be attackers, and least privilege defines the services and data authorization. A Zero Trust mindset is important for organisations to reduce...
An Incident Response Plan is essential for businesses. Meliá Hotels International had to deploy its incident response plan after being hit with a ransomware on October 4th, the same day...
Ransomware attacks are attacking SMB's. Here's what you can do to protect your organisation.
Cybersecurity attacks soared in 2020 and this continued in 2021. Discover the malware hot spots and trends and be ready for them in 2022.
Cases of ransomware attacks have increased dramatically over the last few years. Find out how you can protect yourself from these attacks.
Discover why an MSP partnership is so beneficial in a layered security approach for an SMB.
81% of MSPs see unchanged or improved revenues as we come out of the pandemic. Discover three key strategies for MSPs to achieve strategic growth.
California-based companies must be aware and compliant with data laws such as CCPA and CPRA.
Hotels can exercise total control over Internet content by using WebTitan, a cloud based web content filtering solution.
MSPs must put customers at the forefront of their business. Here are the best tips for MSPs to enable a customer-first focus.
The use of a DNS filter helps to controls the attack surface and prevent potential damage from phishing & ransomware attacks. This article shows how MSPs can increase their profit margins...
Leading email and web security vendor TitanHQ are delighted to be exhibiting again at CompTIA EMEA. CompTIA is the leading trade association for the global technology industry.
PST files cause problems and unnecessary overheads for administrators. Discover why administrators should archive data.
Email communication contains information that could be used in future litigation, compliance audits, and investigations into a data breach. Archiving email data is a critical layer in a cybersecurity defence.
Cybercriminals are targeting MSPs as they hold sensitive and valuable data belonging to SMB clients. Discover how MSPs can prepare themselves and their client base from future cyberattacks.
Many small businesses feel they are impervious to the attention of hackers due to their small size. Learn how you can protect your MSP clients from cyberattacks.
It's easy to fall for a phishing email. Here are some examples of phishing emails to be aware of.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us