IT security in 2022 – what you need to know

By Jack Rosier of QMS International, one of the UK’s leading ISO certification bodies We’re living in the age of computers, with technology playing a more important role in our lives with each passing year. With the pandemic acting as a catalyst for increasing digitalisation, 2022 is likely to see more technology usage than ever […]
Backup is dead: True Cyber Protection is the way ahead

By Adam Brace, EveryCloud So, is Backup Really Dead? In the traditional sense we would say yes, as Cyber Criminals have developed and deployed ways that mean backing up alone is not enough to provide true data protection. Now (and especially in the future), to be fully protected, organisations need to ensure their data is recoverable, […]
Identify and investigate Business Email Compromise (BEC) scams

Business Email Compromise is an email-based phishing attack that specifically targets businesses and organizations to steal money, sensitive information, or account credentials. These attacks can be difficult to prevent as criminals may utilize social engineering techniques such as impersonation and intimidation to manipulate users. Threat actors will often prepare for BEC attacks by first performing […]
Ransomware Year in Review 2021

By Varonis In 2021, attacks became highly effective and impactful. At the same time, high-volume indiscriminate ransomware threats remained omnipresent throughout the year. In this post, the Varonis Threat Labs team shares what they observed in the wild while working on ransomware investigations. Overall, the team identified these five ransomware trends that shaped 2021: Ransomware-as-a-Service […]
The rise of Ransomware-as-a-Service and how organisations can protect themselves

By Keith Glancey, Head of Solutions Architect at Infoblox Over the years, ransomware has become an increasingly popular attack method for hackers looking to make a large return on investment. The COVID-19 pandemic only accelerated this problem further, opening up new opportunities for cybercriminals to cause disruption and find vulnerabilities. As businesses continue to struggle […]
Cybersecurity priorities: Why AI-powered threat detection should be in your plans

By Atech Cloud The changed world we’ve found ourselves living in since the global pandemic struck in 2020 has been particularly helpful to cybercriminals. Nothing illustrates this so well as the SolarWinds hack, described by Microsoft president Brad Smith as the most sophisticated cyberattack of all time, the reverberations of which have been felt throughout […]
Salesforce security: 5 ways your data could be exposed

By Varonis Salesforce is the lifeblood of many organizations. One of its most valuable assets-the data inside-is also its most vulnerable. With countless permission and configuration possibilities, it’s easy to leave valuable data exposed. That, coupled with the fact that most security organizations aren’t very familiar or involved with Salesforce’s administration, opens organizations up to massive risk. Here […]
Prepare for Battle in 2022: How hackers and the new world of work are shaping security models

By Atech The main challenge in 2022 is data loss prevention (DLP) and it’s clear to see already from vendors’ such as Microsoft’s compelling propositions for compliance solutions. We are moving towards detecting data loss in real time. As we understand more about the human element in breaches and develop smarter controls and human-like detection […]
Download your complimentary copy of the 2021 Gartner Market Guide for Email Security

By Tessian Big News! Tessian has been recognized as a Representative Integrated Cloud Email Security (ICES) Vendor in the 2021 Gartner Market Guide for Email Security. Learn more about the changing threat landscape, Gartner’s recommendations, and what sets Tessian apart. This report states that “Email continues to be a significant attack vector for both malware […]
Cloud applications put your data at risk — Here’s how to regain control

By Yaki Faitelson, Co-Founder and CEO of Varonis Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organisation safe from cyberattacks, they’re also a big, growing risk. Your data is in more places than ever before. It lives in sanctioned data stores on premises and in the cloud, in online collaboration […]