Even before Covid-19 the cybersecurity threat landscape was evolving at a frightening pace. The combination of people spending more time online and their uncertainty around the elements of the pandemic and its consequences has played right into the hands of cybercriminals. Now threat actors are taking full advantage of Covid-19 with a vast portfolio of scams, including ransomware and phishing campaigns.more →
Health insurance company BUPA has been hitting the headlines over the past year or so due a significant data breach that took place in early 2017.
Between January 6th – March 11th 2017, an employee managed to access their customer relationship management system (SWAN), and extract credentials of 547,000 global customers.more →
Mental health in the workplace is increasingly becoming recognised by CEOs and MDs across the globe, with businesses finding that happier employees means increased productivity. However, it is still a largely unaddressed issue that cannot be ignored. Stress seems to be considered normal; in his 2018 book, Jeremy Pfeffer refers to long working hours as a necessity for employees wanting to advance in their career.more →
Living In the Clouds
You really can’t talk about IT these days without mentioning cloud or something-as-a-service. For some it is hard to remember a time when we did not have the cloud, at least in some basic form. But I do remember the beginnings, and for me the whole cloud journey has come full circle.more →
This month we are sharing a blog from our security partner Dome9 that takes a look at the five most likely public cloud threats.
The move to AWS and other public cloud services is a strategic initiative for many enterprises today. While companies rush to expand their cloud presence and use more cloud services, security considerations are lagging behind.more →
This month we are publishing a blog from cloud security partner, Zenedge. Here, we explore the evolution of the security threat landscape, from threat actors improving their hacking techniques to the increasingly daunting task of protecting public-facing web applications and API endpoints. Not only do organizations need to get to grips with reality and understand they are under attack nearly 100 percent of the time, they must also come to terms with the fact that their current approach to defending their applications and APIs is woefully deficient.more →