Cisco predicted that the number of mobile-connected devices per capita would reach 1.5 by 2022. As 2022 comes to a close, we see that figure as accurate as mobile traffic exceeded wired. Cisco goes on to say that Mobile-to-Mobile (M2M) connections are increasing more rapidly than other categories as 4G networks continue to improve and the … Read More
Author: Andrew Radford
7 Retail Cybersecurity Threats Causing Lost Revenue
Now more than ever, retail cybersecurity threats are causing lost revenue as cybercriminals are focusing on the retail industry, launching cyberattacks and data theft on retailers as well as their customers. The eCommerce industry was steadily growing; however, the onset of the covid-19 pandemic created the demand that expanded online shopping so quickly that IT … Read More
Encrypted Malware: Next Generation Threat?
Security analysts have calculated that over 90% of all internet traffic is now encrypted. While data encryption is essential for privacy and confidentiality, it does create dangerous blind spots in security due to malicious activity such as encrypted malware. Antivirus suites and firewall systems monitor potential threats, though they cannot easily detect malicious malware lurking … Read More
9 Major Types of Malware Payload (Quick Guide)
In the post-Covid era of mobile computing, an increasing number of different types of malware are being used by cybercriminal gangs. Even after offices reopened their doors, remote workforces are still expanding, creating more endpoints on every network. More users and endpoints mean more opportunities for hackers to deploy their malware. What’s more, attack types … Read More
6 Botnets On The Rise (And How To Avoid Them)
So, what is a botnet? A botnet is a collection of networked machines that can be employed beneficially or with malicious intent. Legitimate uses for bots include crawling and indexing websites for search engines, chatroom policing, and crypto mining. On the darker side, botnet activity has a criminal element. Botnets allow cybercriminals to infect and … Read More
What Is Scareware (& How To Prevent It)
What is scareware? Scareware is a social engineering scam that exploits people’s fear of losing access to their devices and data. This rogue program has been wreaking havoc for decades, most likely back to the 1990s, and can be installed on a user’s device via malware. Appearing on a user’s screen via a pop-up message, … Read More
29 Cybersecurity Terms You Need To Know (Today)
With cyberattacks constantly increasing and evolving daily, there are an increasing number of cybersecurity terms you need to know to ensure you keep safe in the digital age. While the following glossary is not comprehensive, it does contain 29 fundamental cybersecurity terms and their definitions to help you better understand the concepts and best practices … Read More
What Is An Evil Twin Attack? (Plus 8 Prevention Tips)
An evil twin attack can affect anyone who uses public Wi-Fi while they’re on the go, whether it’s to check messages, browse online, post on social, or perform urgent online banking. Professionals, especially those who travel for work, doing business in coffee shops, airports and hotels, are most at risk. However, public Wi-Fi carries additional … Read More
11 Tell-Tale Signs You Are Infected With Malware
Recognising the signs you are infected with malware isn’t always easy. Cybercriminals disguise their work and bury malware deep within system files and registries, making it difficult to detect and remove. There are tell-tale signs that both users and IT teams can look out for that will help recognise a malware infection sooner rather than … Read More
Endpoint Protection Vs Antivirus (8 Key Areas Investigated)
When considering what type of cybersecurity protection your business needs, it’s easy to become lost in a sea of terms, similar-looking security software suites, and various security options/features. Your security plan will depend on the size of your business and the scope of your network. You are likely familiar with two competing terms that we … Read More