Even before Covid-19 the cybersecurity threat landscape was evolving at a frightening pace. The combination of people spending more time online and their uncertainty around the elements of the pandemic and its consequences has played right into the hands of cybercriminals. Now threat actors are taking full advantage of Covid-19 with a vast portfolio of scams, including ransomware and phishing campaigns.more →
Who are Gen Z?
Last year Gen Z became the largest generation, constituting 32 percent of the global population. But what is Generation Z? Definitions vary but are thought to be those born between the mid-1990s and the mid-2000s. Pew Research pins this down to 1997 onwards, with Forbes citing Generation Alpha as 2010-2025.more →
For most UK businesses, the shift to respond to the Coronavirus lockdown was astonishingly rapid and reactive by necessity. The security teams that we worked with coped admirably with the adjustment and, at the time of writing, there have been no major or high-profile security incidents related to remote work in the UK (thankfully).more →
This month we are sharing a blog from our partner eSentire on how to prepare for the move back to the office (B2TO).
Practically every organization (that’s not wholly shut down) has been forced by COVID-19 into a rapid “digital transformation mode” by working from home, and to one degree or another they’re managing to keep operating.more →
This month we are sharing a blog from our partner Crowdstrike.
The term “social distancing” has swept across the world. It is an incredibly important response measure during a pandemic. The term is not new; just over 100 years ago, cities across the U.S. introduced measures to limit public gatherings due to the outbreak of the Spanish flu.more →
This month we are sharing a blog from our partner Radware who explain why DDoS protection is so important.
DDoS protection can easily be compared to a car’s airbag system: it’s hard to appreciate its true value until it’s needed. Like airbags, DDoS protection provides invaluable peace-of-mind and a constant safeguard against the lurking threats that no one wants to think about, but must always prepare for.more →
The impact of data breaches, network hacks or well-crafted phishing campaigns is often reported in the press. These reports often cover reputational loss and financial cost to the victim that can run into tens or hundreds of thousands of pounds. But what about the little guy?
Small businesses can often be the focus of specific targeted email-based attacks.more →
Why conduct a DDoS Test?
Historically, security specialists have never placed DDoS testing high on the IT agenda, relying mainly on vulnerability assessment and penetration testing as a means of security validation. However, things are changing. DDoS attacks are no longer simply a risk to the availability of an IT system or service.more →