Blog

A Vulnerable World: RiskIQ’s Unique View of the Microsoft Exchange Landscape

Frankly, it’s a tough time to be in cybersecurity. Perhaps the toughest ever. There have been over a dozen zero-days in the past three months alone, with countless organizations across the world affected.

We’re barely four months removed from SolarWinds—a watershed attack some thought would set the standard for the impact a vulnerability could have—and already dealing with a new attack that dwarfs it in scale.

more →

Blog

How activereach Used DNS-Layer Protection To Secure Their Retail Client’s Stores And Users

Our Client:

Fabb Furniture is the leading regional furniture and carpet retailer in the UK with an established base in the East of England where it has traded for over 40 years.

With 22 sites defined requiring protection, visibility and control of their network, activereach proposed Cisco Umbrella as the solution.

more →

Blog

Adaptability And Resilience Will Remain Key For Cybersecurity In 2021

In 2020, breaches were the digital pandemic. Cybercriminals were provided with the opportunity to disrupt and target the weak areas of organizations that were not prepared to work remotely securely.

It is certainly true to say that we are all glad to see the back of 2020. But not withstanding these difficult and challenging times, what does the cybersecurity landscape look like in 2021?

more →

Blog

Threat Management In The Cloud

This month we are sharing a blog from our partner Netskope who explain the current threat trends in the cloud.

Bad actors are constantly looking for new ways to attack the enterprise. There are many known patterns of execution that are still very effective such as phishing, BEC scams, vulnerability searches on exposed websites/systems, lack of hardened systems, and misconfigurations left unaddressed/unscreened before releasing to production, leaving company’s assets exposed.

more →

Blog

Cybersecurity Predictions for 2020

Sharon Holland

The dizzying speeds of development in today’s technologies create more opportunities for cybercriminals than ever before.  Each year we are seeing more and more challenges in the fight against cybercrime.  With so many potential targets in the IT environment: on-premise networks, cloud, mobile, and IoT devices, there are many areas that could provide a vulnerability for a cybercriminal to take advantage of.

more →