Blog

Top 6 Risks to the Enterprise from The Internet of Things (IoT)

IoT devices are everywhere and some businesses are only just starting to realise the security implications of so many unmanaged items on their network.  The number of IoT devices is forecast to increase five fold to 75 billion devices by 2025.  Couple the roll out of cellular IoT and faster 5G networks with vulnerable IoT devices, and you could be gifting hackers the ability to utilise compromised devices to launch DDoS attacks and/or deploy malware.

more →

Blog

Is It Legal To Evaluate a DDos Mitigation Service?

This month we are sharing a blog from our partner Radware that takes a look at DDoS mitigation testing.

A couple of months ago, I was on a call with a company that was in the process of evaluating DDoS mitigation services to protect its data centers. This company runs mission critical applications and were looking for comprehensive coverage from various types of attacks, including volumetric, low and slow, encrypted floods, and application-layer attacks.

more →

Blog

Optimizing Your Security: Are You Prepared For A Cyber-Attack?

Mike Revell

According to the Global Cybersecurity Status Report conducted by ISACA International in 2015, just 38% of global organizations claim they are prepared to handle a sophisticated cyber-attack. This scarily small figure shows just how at risk we are. Cyber-attacks are becoming increasingly common; a 2017 Malwarebytes report found that the frequency of ransomware attacks alone has increased by nearly 2000% in the past 2 years.

more →