
How Data Leaks Forge Links Between Privacy and Security
Trevagh StankardThe data leak exposing 533 million Facebook users is an example of an avalanche of stolen data. Data breaches can have a devastating effect on a business, but can they be...
The data leak exposing 533 million Facebook users is an example of an avalanche of stolen data. Data breaches can have a devastating effect on a business, but can they be...
As an MSP offering, security awareness training complements security measures that perform first pass protection against phishing.
MSP's have a large responsibility to protect small business data from ransomware and data breaches. Find out the four primary cybersecurity concerns for MSPs in 2021.
One of the latest threats uses RTLO and the Unicode character U+202E to make a seemingly harmless text file into a sophisticated attack. Learn more in this article.
Remote employees and the global pandemic lockdowns led to sophisticated cyberattacks in compromising business systems. Discover how to reduce the risk of phishing and ransomware in this article.
A new ransomware strain has been discovered. Here's all you need to know about Epsilon Red ransomware.
In most ransomware attacks, the start of the compromise is a phishing campaign. Threat actors only require one recipient to click a link to run malware on their system.
Cybercriminals are targeting victims with advanced phishing attacks using PDF's. Discover the latest PDF phishing attacks to watch out for in this article.
The GitHub user base has become the latest victims of lucrative cybercriminals. With over 100 million code repositories and its treasure trove of software code, fraudsters are cashing in.
What happens when a critical infrastructure of a country is compromised? Discover what happened in the Colonial pipeline ransomware attack and the major problems that occurred as a result.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us