
Cy-BOO!-Security Awareness Month Competition Winning Entries
Selina CoenExplore the chilling tale that won our Cy-BOO! Security Awareness Month Competition, revealing the eerie truths of cybersecurity in a hair-raising narrative.
Explore the chilling tale that won our Cy-BOO! Security Awareness Month Competition, revealing the eerie truths of cybersecurity in a hair-raising narrative.
Step into the spine-chilling world of cybersecurity horrors this Halloween season. Uncover hair-raising tales of data breaches and cyber threats haunting major companies in 2023.
Explore the World of Security Awareness: From understanding evolving cyber threats to practical tips for fortifying your digital defenses, this comprehensive guide equips you with actionable insights. Dive into threat...
Phishing scams are getting more sophisticated however there are lots of things users can do to avoid being phished.
Hardware firewalls are the cornerstone of network security for almost all TCP/IP networks. For SMB and enterprise network environments, the network firewall provides the basic defense against attacks.
With Valentine's Day around the corner, cybercriminals are ramping up spam and phishing attacks targeting this lover's holiday.
Cyber-criminals shut down an entire New Jersey public school district through a successful ransomware attack. Discover what school systems can do to stop ransomware.
Data theft causes more than just consumer identity theft, fraud, and business reputation damage, it also leads to costly compliance violation payments and litigation.
An Evil Twin hotspot is a Wi-Fi access point set up by a hacker to mimic a legitimate AP to connect users to the fake network to steal data.
DNS filtering is essential in protecting against web-based threats such as phishing and malware. Here we explain the risks, features, and benefits of DNS filtering and it can protect employees...
Malware is ever-evolving and becoming more harmful. Agent Tesla, a .net-based keylogger is a formidable Remote Access Trojan (RAT) known for becoming exceptionally good at breaking through cybersecurity defense barriers...
One rarely discussed benefit of cloud-based web filtering is how it improves network performance and eliminates the workload put on servers by other solutions for filtering Internet content.
Wireless systems remain a point of vulnerability for hackers to exploit. This article outlines some steps you can take to secure Wi-Fi in your business.
A system administrator’s job is tough. Dealing with finnicky hardware, obtuse software, and wailing clients. Here are some tips to make your day go more smoothly.
Most Systems Administrators do an excellent job; however sometimes, under pressure, mistakes happen. We have devised a target list of things for IT system admins to avoid at all costs.
Government and Universities were among the worst hit with ransomware attacks this year. Here's what you can do to prevent phishing and malware.
The OFAC issued an advisory warning to organisationw on the legal challenges of paying a ransom fee. Here is what you need to know to avoid legal action.
Attackers on a public Wi-Fi network have numerous ways to steal data. The most common in a man-in-the-middle (MitM) attack.
A new ransomware variant has emerged, known as Lapsus$. The hacking group behind Lapsus$ targets victims with phishing emails to deploy ransomware. Learn more about Lapsus$ and how it works...
In this blog we've outlined some of the most prevalent dangers that your organization faces from a phishing attack and how to combat them.
In March of 2021, a new ransomware technique called RTF Template Injection was discovered. Since then, it has been adapted by several nation state actors. It is anticipated that its use...
Crypto trading platform Bitmart announced they were the victims of a large scale security breach in which close to $200 million of crypto currency was stolen by hackers.
On December 9, 2021, Apache disclosed CVE-2021-44228 , a remote code execution vulnerability affecting the Apache Log4j2.
There are many ransomware strains and variants that can cause result in major damage to your business. Take a look at the most recent ransomware strains and variants.
Password stealing incidents that involve malware known as Trojan-PSW, has increased by 45% over the last 6-months. Here are the best practices to prevent password stealing success.
The supply chain is a vital enabler of business across the globe. Supply chain security attacks are becoming too common, discover the latest trends.
Cybersecurity attacks soared in 2020 and this continued in 2021. Discover the malware hot spots and trends and be ready for them in 2022.
Cases of ransomware attacks have increased dramatically over the last few years. Find out how you can protect yourself from these attacks.
Hotels can exercise total control over Internet content by using WebTitan, a cloud based web content filtering solution.
Leading email and web security vendor TitanHQ are delighted to be exhibiting again at CompTIA EMEA. CompTIA is the leading trade association for the global technology industry.
SpamTitan has released a new geoblocking features. Learn all about geoblocking in this article.
The Dark Web is an encrypted network between Tor servers and their clients. Tor is an acronym for "The Onion Router" . It's entirely separate from the World Wide Web.
Every organization that provides email to its employees needs to secure all email accounts from phishing attacks. Discover how to identify & avoid phishing scams.
In 2020, 61% of companies were victims of ransomware and 34% lost their data forever, even if they paid the ransom. Discover 5 Ransomware Attacks of 2021.
The possibility of a malware infection is the reality for everyone who owns a computing device. Here are 11 strategies to help decrease your chance of opening the door to malware.
Cryptocurrency is booming, and hackers are cashing in. Cybercriminals have added malware to pirated games using Crackonosh.
Organizations must act to prevent Phishing and Malware attacks before they occur. 79% of organizations were impacted by a DNS attack last year, costing them an average of $924,000 (£782,000).
Crypto phishing scams have increased more than 1,000% since last October. In one instance alone, scammers were able to get away with $15 million from a single company.
Take a look at three of the most notorious ransomware hacking groups. Find out what makes them so dangerous and how to protect your organization from them.
The data leak exposing 533 million Facebook users is an example of an avalanche of stolen data. Data breaches can have a devastating effect on a business, but can they be...
As an MSP offering, security awareness training complements security measures that perform first pass protection against phishing.
Remote employees and the global pandemic lockdowns led to sophisticated cyberattacks in compromising business systems. Discover how to reduce the risk of phishing and ransomware in this article.
A new ransomware strain has been discovered. Here's all you need to know about Epsilon Red ransomware.
In most ransomware attacks, the start of the compromise is a phishing campaign. Threat actors only require one recipient to click a link to run malware on their system.
What happens when a critical infrastructure of a country is compromised? Discover what happened in the Colonial pipeline ransomware attack and the major problems that occurred as a result.
What is the IoT (Internet of things)? This is such a widely used term but often misunderstood. The Internet of Things is the fleet of devices with embedded electronics and...
As the global pandemic hit, cybersecurity was an afterthought for schools and business around the world as they went virtual. Cybercriminals took this as an opportunity to hit vunerable organisations...
The Washington DC police force fell victim to a ransomware attack. This was not the first time the US police force were targeted with ransomware.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us