https://www.linkedin.com/embed/feed/update/urn:li:share:7255358135266144257
Many small businesses make the mistake of skipping policies. They feel that things don’t need to be so formal. They’ll just tell staff what’s expected when it comes up and think that’s good enough. But this way of thinking can cause issues for small and mid-sized business owners. Employees aren’t mind readers. Things that you […]
Browser extensions have become as common as mobile apps. People tend to download many and use few. There are over 176,000 browser extensions available on Google Chrome alone. These extensions offer users extra functionalities and customization options. While browser extensions enhance the browsing experience, they also pose a danger. Which can mean significant risks to […]
Introduction In today’s interconnected world, where billions of digital interactions occur daily, businesses must recognise that cyber awareness isn’t a luxury but a necessity. Small and large enterprises can benefit immensely from prioritising cyber awareness as a part of their agenda. This article highlights the substantial long-term advantages of having it at the core of […]
Imagine you’re working away on your PC and see a Windows update prompt. Instead of ignoring it, you take action. After all, you want to keep your device safe. But when you install what you think is a legitimate update, you’re infected with ransomware. That’s the nightmare caused by an emerging cybersecurity threat. Cybercriminals are […]
Cybercriminals can launch very sophisticated attacks. But it’s often lax cybersecurity practices that enable most breaches. This is especially true when it comes to small and mid-sized businesses (SMBs). Small business owners often don’t prioritize cybersecurity measures. They may be just fully focused on growing the company. They think they have a lower data breach […]
Cybersecurity threats are becoming increasingly sophisticated and prevalent. In 2022, ransomware attacks jumped by 93%. The introduction of ChatGPT will only increase the potential damage of cyber-attacks. Protecting sensitive data and systems requires a comprehensive approach. One that goes beyond a single security solution. This is where a defense-in-depth cybersecurity strategy comes into play. In […]
Companies both large and small share this one cybersecurity problem. They have computers that are still running older operating systems. Staff might use these devices only occasionally. Or the company may be running customized software that won’t run on newer OS versions. The problem is that when the OS becomes outdated, the system is open […]
The new year has begun and it’s a time of renewal as we plan for the possibilities to come in 2023. It’s also a time when you need to plan for resiliency in the face of ever-present cyberattacks. Sixty-eight percent of surveyed business leaders feel that cybersecurity risks are getting worse. They have a good […]
❗ Security alert ❗ Citrix has just announced a vulnerability discovered in Citrix Gateway and Citrix ADC. Citrix ADC or Citrix Gateway appliances configured as a SAML SP or a SAML IdP are affected by the CVE-2022-27518 vulnerability, which allows unauthenticated remote arbitrary code execution. The following supported versions of Citrix ADC and Citrix Gateway are affected by this […]
Nearly all organisations own some form of NAS storage device that they use for various purposes. Firstly, as a backup destination which is the most common usage. Secondly, as a Web Server, and thirdly, as a hypervisor to host Virtual Machines. In this post, we focus on applying the best practices to such devices regardless […]
What is an MFA Fatigue Attack? An MFA Fatigue attack is a strategy used by threat actors to abuse sign-in security by forcing users to grant them access to get relief from the MFA flood. The method is also known as MFA bombing and is considered a high-profile attack. How it works This strategy, combined […]
Have you ever heard of the Air Gap Backups? This blog post discusses Air Gap Backups and how you can use them to your benefit. What is an Air Gap Backup? Air Gap Backup is an effective data protection strategy used to take backup copies off infrastructure and keep them offline, thus, making them inaccessible […]
It appears two new Microsoft Exchange Zero-Day vulnerabilities are being exploited in the wild. While the exploitation is not yet confirmed, attacks have been launched on fully patched Exchange servers affecting companies and organisations. If you run Microsoft Exchange on-premises and have Outlook Web App (OWA) facing the internet, the chances are you are impacted. […]
- 1
- 2