0

THE MOST POPULAR (AND LUDICROUSLY SIMPLE) PASSWORDS OF 2019

It seems that no matter the repeated advice regarding security breaches and password importance – people just don’t get it! Regardless of news stories depicting data hacking [...]

0

Cyber Security Predictions For 2020

When it comes to cybersecurity, the variety of attacks and threat vectors seem to shapeshift on an almost weekly basis. The good news is that as cybercriminals become more sophisticated, [...]

0

Around 44 Million Microsoft Users Reused Passwords: Microsoft

For many people, remembering a small shopping list pushes the boundaries of the adult memory, let alone memorising a unique password for EACH of their online accounts. Using a standard password [...]

0

The three best password security tricks

According to a recent Verizon Data Breach Investigation Report, weak passwords are responsible for as many as 81 percent of hacking-related data breaches. There’s never been a more important time [...]

0

Data security threats to mobile users

Mobile usage is now virtually ubiquitous. It is estimated that around 96% of adults own a mobile phone. (source: Statista) Many employees are accessing corporate data from smartphones, and this [...]

0

Why do you need a data breach response plan?

Within every organisation, there is the burden of having to respond to any serious data breach within 72 hours. GDPR makes this a legal obligation. As many as one in four organisations will [...]

0

Why human error is still a major security worry

As impressively robust as IT security is these days, it seems that the main weakness in cyber security is still human error. According to a new report from BAE Systems, 71 per cent of all [...]

0

Can you protect your business from a data breach?

A recent report from the Ponemon Institute shows that only a third of businesses think they can protect themselves from data breaches. According to the report, patching, regular scanning and [...]

0

Can your car be hacked?

Modern vehicles are basically two-tonne connected, mobile computers on wheels. This makes them great for enjoying many modern comforts and technological innovations during long drives, but what’s [...]

0

How to train your staff to keep your systems protected

Despite popular belief that the number one cause for a security attack is malicious intent, did you know that human error is actually the main cause? With so much resting in the hands of your [...]