The IT Industry is full of terms and acronyms (see our DDoS Dictionary) and one that I have seen a lot of recently is DDoS Pen Testing, usually where Pen Testers are looking to include DDoS Testing as well. I wrote an article a while back on Penetration Testing and DDoS Testing and how these work together.more →
The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before. Each year we are seeing more and more challenges in the fight against cybercrime. With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.more →
We have reached that time of year again. The clocks have been put back, the nights get darker, and the weather is getting colder. Halloween is out of the way, so we are all on the countdown to Christmas. And part of the countdown includes two more recent American traditions – Black Friday and Cyber Monday.more →
Ever wondered what it’s like to experience a cyber-attack? Want to know what the warning signs are? This article recreates a typical ransomware attack scenario of what a business may go through in the first 24 hours when experiencing a data breach.
Fictional high street shoe retailer Shoes-4-U, with branches in every town nationwide, has recently received an email from a supplier.more →
This month we share another blog from our technology partner Akamai on the topic of recursive DNS. Targeted threats such as malware, ransomware, data exfiltration, and phishing are increasing in volume yet many organizations have a blind spot when it comes to the Domain Name System (DNS).
Although every action on the Internet relies on recursive DNS, many security organizations fail to install corresponding safeguards.more →
In a business world that is facing an ever-increasing and intensifying threat landscape, enterprises must re-evaluate their current perimeter security approach. This month we are sharing a blog from one of the pioneers of the “Zero Trust” mentality, Akamai. We take a look at how VPNs are out of date and why we should all be adopting the ‘never trust, always verify’more →
Google has just announced a change to the display by Gmail of the sender icon/picture for unauthenticated senders.
Back in July I wrote an article (Going phishing for whales? A cautionary tale (tail!)) that gave a real-world example of a company that had suffered financial loss through a successful whaling/phishing email thread.more →