10 Mobile Security Threats Leaving a Hole in Your Network

June 24, 2022By Andrew RadfordEndpoint Security, Technology

Mobile devices have completely changed our daily lives, both workday and personal time. The average person spends at least four hours on their mobile phones or tablets daily, with just over 54% of all global website traffic traversing over mobile devices (source).  Becoming increasingly powerful, mobile devices are supplementing and sometimes replacing desktops or laptops. … Read More

Spotting LinkedIn Scam Emails and Fake Job Offers

June 23, 2022By Andrew RadfordCyber Security, Technology

With over 722 million subscribers, it’s safe to say that most professionals use LinkedIn in some form, whether job hunting, networking, recruiting, or promoting a business. However, the same features that make the platform so popular and accessible make LinkedIn a significant security challenge.  Criminals create false LinkedIn profiles to perform social engineering attacks against … Read More

7 Main Attack Vectors Of Ransomcloud

June 19, 2022By Andrew RadfordTechnology

Now that more enterprises are supporting remote employees, the migration of data storage and other business services to the cloud continues to expand. One of the attractions of cloud services is the robustness of operation and increased business continuity.  The infrastructure supporting these various cloud offerings comes from service providers, with some heavy hitters being … Read More

Ransomware and Data Protection: 8 of Your Responsibilities

May 29, 2022By Andrew RadfordCyber Security, Endpoint Security, Ransomware, Technology

The Information Commissioner’s Office (ICO) is the UK authority that upholds information rights and promotes openness from public entities and data privacy for individuals. UK businesses should inform the ICO when they experience a data breach. The ICO helps to guide organisations and individuals regarding ransomware and data protection compliance and provides steps businesses can take to … Read More

ISO 27001 Compliance: Overview & 10-Step Checklist

May 26, 2022By Andrew RadfordTechnology

Information security remains one of the more challenging endeavours for any company. With network breaches and ransomware increasing at alarming rates, ISO 27001 compliance is a deliberate and aggressive countermeasure to protect corporate data. The International Organization for Standardization (ISO) has introduced its ISO 27001 certification as a way for organisations to develop and document … Read More

6 Steps to Greater Cyber Security Alerting & Logging

May 23, 2022By Andrew RadfordCyber Security, Technology

Cyber security alerting and logging are critical elements of any organisation’s IT security solution, becoming the vigilant eyes and ears needed to detect and recover from security events. It also allows your team to ensure that all devices and users accessing your systems comply with your organisation’s security policies. Most corporate security incidents begin from … Read More

SD-WAN Orchestrator: 7 Market-Leading SD-WAN Providers Under The Spotlight

April 27, 2022By Andrew RadfordSD-WAN, Technology

Digital transformation and cloud computing have prompted software-defined wide-area networking (SD-WAN) to replace the traditional WAN for remote and branch office deployments. While SD-WAN provides many benefits, the ability to effectively orchestrate the multitude of efficient data flows that SD-WAN delivers is becoming critical. At the heart of every modern SD-WAN solution is a centralised … Read More

Endpoint DLP: Everything You Need to Know

April 20, 2022By Andrew RadfordCyber Security, Endpoint Security, Technology

Data Loss Prevention (DLP) is a security component that monitors and intercepts the extraction of sensitive data from defined systems on your network. ‘Endpoint DLP’ extends these monitoring and protection capabilities to sensitive data stored on user endpoint devices. An efficient Endpoint DLP solution secures endpoints to prevent data leakage, misuse, loss or theft. DLP … Read More

What Is Spyware & How To Prevent It

April 18, 2022By Andrew RadfordCyber Security, Technology

Whether legitimate or illicit, spyware conducts surveillance activities that leave technology users open to data breaches and misuse of their private data. Malicious spyware can target and infect an entire network, compromising the data security of the whole business enterprise. This article contains an overview of spyware prevention and is aimed at both non-technical individual … Read More

Malvertising: Next Business Impacting Trend?

March 28, 2022By Andrew RadfordCyber Security, Edge Computing

What is Malvertising? This form of malicious advertising is a growing cyberattack trend that injects malicious code into online digital ads. Due to the complex digital advertising landscape, it’s difficult for both users and publishers to detect. As the impacts on business reputation and ROI are significant, we present techniques that users and publishers can … Read More