Why Your Web Filter Should Not Serve as a Second Firewall
Geraldine HuntThe proliferation of mobile devices demands a new type of web filtering architecture which is why cloud-based filtering solutions are quickly becoming so popular.
The proliferation of mobile devices demands a new type of web filtering architecture which is why cloud-based filtering solutions are quickly becoming so popular.
Hackers don’t hack machines, they hack people. The rise in people online in 2020 has resulted in cyberattacks based on human behavior.
A zero-day attack is a threat to which there is no defense in place. Zero-day attacks can be extremely harmful to an organization of any size.
Cyberattacks are currently soaring in the online retail sector. These businesses must protect themselves and their customers.
A preventable cyber-incident was responsible for the death of a person in Germany. The hospital’s emergency services suffered down-time due to a ransomware attack.
The number of ransomware attacks increased by 40% in Q3 of 2020. This equates to almost 200 million infections, globally.
We discussed xxx domains in a blog post a few years ago - there has been much litigation and controversy since. In this article we revisit the .XXX Domain Controversy...
With the sudden increase in remote working in 2020, the rush to provide employees with a workable environment wasn’t thoroughly planned, leading to oversights in relation to cybersecurity.
TA416, a hacking group renowned for their innovative methods of malware delivery, are on the attack again. This latest phishing campaign is complicated, clever, and persistent.
2017 saw a 23.9% increase in cybersecurity incidents involving the healthcare industry with 3,442,7748 records compromised for the year. Why is the theft of millions of health records such a common occurrence?
Discovered in 2014, Emotet has had several iterations to avoid discovery from anti-malware programs. It’s made a comeback in 2020 as a major threat against to organizations.
Email services such as Office 365 are vulnerable to large volumes of credential stuffing attacks. These are highly scaled attacks designed to find the weakest link quickly and easily.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us