INDUSTRY SPOTLIGHT: Falanx penetration testing

To minimise risks from hackers you need to think and act like a hacker. Penetration testing does just that, pseudo hackers attack your systems to help expose and fix vulnerabilities. Whether it’s web applications, internal networks, mobile devices or wireless networks, penetration testing is critical to ensure high levels of cyber security. But why, when […]
Save £35k by deleting emails from your CEO

You work in finance. You get an email from your CEO addressing you by your first name, apologising for the late Friday email, but requesting you make an urgent payment to a regular supplier, with account details helpfully provided in the email. You’d pay it, right? CEO fraud is an increasingly common type of phishing […]
FREE GUIDE: How to reduce the security vulnerabilities in Office 365

You’re likely to follow the path of least resistance, attacking wherever you have the biggest chance of success on the most widely used programs. You will put out Phishing emails, Malware attacks, simple extortion mailers and Business Email compromise (BEC) attacks to gain entry to the target system. Many enterprise organisations’ SaaS technology of choice […]
The Rising Email Threat: Are instant messaging tools the answer?

By Barracuda Networks At Barracuda we believe two heads are better than one. Following that logic, we can’t argue the value of the opportunity to hear from our peers on industry trends. We recently discovered through such means that, for the channel, email security is its biggest focus in 2019, as partners are increasingly helping their customers fight […]
More than half of companies have over 1,000 exposed sensitive files

By Matt Lock (pictured), Director of Sales Engineers UK, Varonis All an attacker needs to steal your valuable data is access. Unfortunately, many companies unknowingly give attackers access to their critical data. Personal identifying information on employees and customers, intellectual property, and more can easily make their way from secured systems to unprotected files and […]
Could your most trusted employee be your biggest threat?

95% of cyber security breaches are due to human error, which in reality means it could be any user, at any time. The best bit? They probably won’t even know they’re doing something wrong, but they have inadvertently just become an unintentional insider threat. As Andy Pearch, Head of IA Services, CORVID, explains, organisations need to stop playing […]
Cybersecurity’s biggest asset: Why use the cloud?

The cloud is one of those hot buzzwords that gets thrown around a lot both in the tech world and in our daily lives. No longer reserved for IT departments alone, the cloud has become something that we depend upon greatly, especially in the way companies go about their business. And it’s about to become […]
Cybersecurity and Financial Services – How Can Organisations Combat the Threat?

By Genevra Champion, Sector Marketing Manager, IT Governance The financial services industry is naturally a lucrative target for cyber criminals. Financial organisations trade and control vast amounts of money, as well as collect and store customers’ personal information so clearly, a data breach could be disastrous for an industry that is built on trust with its customers. The financial services industry is […]
Shadow IT is everywhere – are you at risk?

By EveryCloud Cloud services – SaaS and IaaS – are everywhere. Businesses rely on their flexibility and the productivity they deliver. But what about the cloud services you don’t see? Business-led cloud services, or “Shadow IT”, have sprung up in dozens of departments and project teams. In every corner of the business and outside the […]
Evolving mobile device management strategies

By Dom Hume, VP Product & Technical Services, Becrypt As organisations continue to innovate to realise efficiencies through the use of increasingly sophisticated and pervasive mobile technologies, many are continually challenged by the risks associated with managing an ever growing device estate. Successfully managing the complexity of multiple software and hardware mobile platforms necessitates a […]