In this next summer security article, and with the summer holiday season upon us, we take a look at the various aspects of protecting your business when your staff are on holiday, offering practical advice and solutions to help you stay secure and efficient while staff are physically away.
Read MoreIT Security
NHS Cyber Attack Means Blood Donors Needed Urgently
A recent ransomware cyber-attack on a provider of lab services to the NHS led to so much disruption in several major hospitals that an urgent appeal for donations of O-type blood was issued.
Read MoreEx-Employees : Offboarding Checklist
Here we look at why organisations need to have an effective employee offboarding procedure in place and suggest a checklist for you that could form the basis of this procedure.
Read MoreWales Has Put A SOC In It!
The UK’s first national security operations centre (SOC) known as CymruSOC, has launched in Wales to protect the country’s local authorities and fire and rescue services from cyber-attacks.
Read MoreRealtime Deepfake Dating Scams
Here we look at how scammers are now reportedly using face-swapping technology to change their appearance in real-time to conduct video-based romance scams.
Read MoreSecurity Alert: Snapchat Photo Scam Targeting Teen Boys
Police and the US Charity National Center for Missing and Exploited Children have warned of a nude photo Snapchat scam targeting teen boys that could cause emotional trauma.
Read MoreICO Cookie Warning To Top Websites
The UK Information Commissioner has warned some of the UK’s top websites that if they don’t offer users fair choices over cookie use, as required by data protection law, they will face enforcement action.
Read MoreFirefox Helps You Hide (Your Emails)
Inbox stuffed full of spam?
Firefox can make your email address less visible, thereby (hopefully) reducing the bloat within your inbox from spammers.
Read MoreWhat’s Involved In a ‘Pen-Test’ ?
Put simply, pen testing is short for “penetration testing” and in acts like a security health check for computer systems and networks.
Read MoreWhat Are ‘Zero-Day’ Attacks?
Zero-Day attacks. What exactly are they and we can your business do to protect yourself from them?
Read More