Even before Covid-19 the cybersecurity threat landscape was evolving at a frightening pace. The combination of people spending more time online and their uncertainty around the elements of the pandemic and its consequences has played right into the hands of cybercriminals. Now threat actors are taking full advantage of Covid-19 with a vast portfolio of scams, including ransomware and phishing campaigns.more →
Who are Gen Z?
Last year Gen Z became the largest generation, constituting 32 percent of the global population. But what is Generation Z? Definitions vary but are thought to be those born between the mid-1990s and the mid-2000s. Pew Research pins this down to 1997 onwards, with Forbes citing Generation Alpha as 2010-2025.more →
The IT Industry is full of terms and acronyms (see our DDoS Dictionary) and one that I have seen a lot of recently is DDoS Pen Testing, usually where Pen Testers are looking to include DDoS Testing as well. I wrote an article a while back on Penetration Testing and DDoS Testing and how these work together.more →
The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before. Each year we are seeing more and more challenges in the fight against cybercrime. With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.more →
We have reached that time of year again. The clocks have been put back, the nights get darker, and the weather is getting colder. Halloween is out of the way, so we are all on the countdown to Christmas. And part of the countdown includes two more recent American traditions – Black Friday and Cyber Monday.more →
Ever wondered what it’s like to experience a cyber-attack? Want to know what the warning signs are? This article recreates a typical ransomware attack scenario of what a business may go through in the first 24 hours when experiencing a data breach.
Fictional high street shoe retailer Shoes-4-U, with branches in every town nationwide, has recently received an email from a supplier.more →
This month we share another blog from our technology partner Akamai on the topic of recursive DNS. Targeted threats such as malware, ransomware, data exfiltration, and phishing are increasing in volume yet many organizations have a blind spot when it comes to the Domain Name System (DNS).
Although every action on the Internet relies on recursive DNS, many security organizations fail to install corresponding safeguards.more →
In a business world that is facing an ever-increasing and intensifying threat landscape, enterprises must re-evaluate their current perimeter security approach. This month we are sharing a blog from one of the pioneers of the “Zero Trust” mentality, Akamai. We take a look at how VPNs are out of date and why we should all be adopting the ‘never trust, always verify’more →