Phishing Attacks: Why they still work and How to stop them Phishing remains one of the most effective forms of cyberattack, despite advances in cyber security. These attacks often exploit human psychology, manipulating individuals into revealing sensitive inf... Cybersecurity 25 Oct 2024
On-Premise vs Cloud Storage: the Data Storage Dilemma Deciding where to store data — on-premise or in the cloud — has become a critical decision for any modern company. Many organisations now adopt hybrid cloud strategies, taking advantage of both on-sit... Data Management 18 Oct 2024
24 year old hacks Italian Ministry of Justice A 24-year-old hacker broke into the computer systems of the Italian Ministry of Justice and attacked the computer systems of the Finance Guard. This is what was discovered in an investigation coordina... Cybersecurity 4 Oct 2024
ENISA Cyber Threat Landscape Report 2024: Key Findings The European Union Agency for Cybersecurity (ENISA) has recently released the 2024 Threat Landscape Report, a comprehensive analysis of cybersecurity trends from July 2023 to June 2024. The report hig... Cybersecurity 27 Sep 2024
How to Protect Against Ransomware: Key Strategies Ransomware attacks are among the most damaging cyber threats today. These attacks involve hackers encrypting data and demanding payment for its release, leading to severe financial, reputational, and ... Cybersecurity 20 Sep 2024
What is “Security Data” and Who needs it? Security data refers to any type of information that helps organisations detect, analyse, and respond to cyber security threats and vulnerabilities. It includes a wide range of digital evidence and in... Cybersecurity Data Management 13 Sep 2024
Identity Access Management Risks in Software Applications Software applications today are the gatekeepers of company's sensitive and strategic information. Whether it's cloud-based SaaS (Software-as-a-Service) or on-premise solutions, strong identity managem... Cybersecurity Data Management Identity Management 6 Sep 2024
How to Stay Safe on Public Wi-Fi Beware of Evil Twin Attacks! Public Wi-Fi networks are convenient and ubiquitous, making it easy to check messages, browse online, or catch up on work while out and about. Whether you’re at a coffee ... Cybersecurity 8 Aug 2024
Access Control Lists: Your First Line of Defence Confidentiality is one of the fundamental principles of information security, along with integrity and availability. It involves protecting information from being disclosed to unauthorised individuals... Access control lists Cybersecurity Data Management effective permissions 12 Jul 2024