The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before. Each year we are seeing more and more challenges in the fight against cybercrime. With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.more →
This month we are sharing a blog from our security partner Radware that takes a look back over the 12 months since GDPR came into force.
Data breaches are expensive, and the costs are only going up.
Those reporting attacks that cost 10 million USD/EUR/GBP or more almost doubled from last year — from 7% in 2018 to 13% in 2019.more →
You can’t turn on the news without hearing about Brexit, but exactly how it is going to affect your business in relation to data protection?
What UK companies should do about data protection and GDPR when we Brexit
Six Steps to GDPR Compliance post Brexit:
- Get a hold of yourself.
2018 was a big year for cybersecurity, with increased usage in areas such as cloud adoption, AI and a move away from perimeter-based security systems. 2019 looks set to be an equally important year so we thought we would look ahead to what we think will be at the forefront in the next 12 months and list our 2019 Cybersecurity Predictions.more →
Living In the Clouds
You really can’t talk about IT these days without mentioning cloud or something-as-a-service. For some it is hard to remember a time when we did not have the cloud, at least in some basic form. But I do remember the beginnings, and for me the whole cloud journey has come full circle.more →
Ever wondered what it’s like to experience a cyber-attack? Want to know what the warning signs are? This article recreates a typical ransomware attack scenario of what a business may go through in the first 24 hours when experiencing a data breach.
Fictional high street shoe retailer Shoes-4-U, with branches in every town nationwide, has recently received an email from a supplier.more →
Guess Who? Identity theft?
“Does your person have blue eyes?” “Does your person have massive eyebrows?” “Is your person wearing a hat?” “Is your person Frank?”
I was playing Guess Who? with my youngest son yesterday. Guess Who? is a game I played as a child and I’ve always enjoyed its simplicity.more →