steps after a ransomware attack

Steps To Respond To a Ransomware Attack

Cybersecurity is an important topic for any business now. In the last 12 months, 32% of businesses experienced some sort of cyber attack or data breach. That means that every third business had to deal with a cyber-attack, according to the Cyber Security Breaches Survey 2019 by the UK Department for Digital, Culture, Media, and

cyber landscape report

The Link Between Unpatched Machines, Ransomware, and Data Breach Threats Increase Threat Severity for Businesses

Boardish has released a cyber landscape report that summarises the latest changes in the threat landscape. As a tool created for CISOs and cyber professionals who work on quantifying the impact of cyber threats and solutions into financial figures, Boardish has recently moved from beta to production.  The ultimate goal that Boardish wishes to achieve

feature image for data discovery in cyber security implementations post

Data Discovery as an Important First Step in Cyber Security Implementations

Data security is the staple of a successful business in this era, and most businesses invest into at least basic cyber security. After all, it’s much more affordable when compared to the aftermath of a data breach. Before you implement security measures that will keep your business and reputation safe, you should know what type

feature image for the importance of cybersecurity in businesses in 2019 post

The Importance of Cybersecurity for Businesses in 2019

Cybersecurity is a vital part of every business that deals with any type of sensitive data. With online threats becoming more diverse every day, and the increasing regulations like GDPR. It is imperative that businesses stay on top of the latest cybersecurity developments for 2019. Here are the most important things to consider when looking

7 Ways to Prevent Your Social Media Being Hacked

7 Ways to Protect Yourself From Social Engineering Hacks

Human interaction is the element that makes social networks so great, and businesses use it to connect with their user bases on an individual level. This human connection is also a vector used by hackers to get access to classified information, as well as access to internal networks and data. Such techniques are known as

hospitality business hacking

5 Reasons Hospitality Businesses Get Hacked

The last several years have revealed that hospitality businesses are vulnerable to cyber attacks. Many major hospitality players being victims of cybercrime that was in some cases undetected for years. In a separate post, we have cited six hospitality businesses that faced data breach fines resulting from hospitality business hacking. Hackers are becoming increasingly innovative

Why It’s Safer to Tether Your Internet Than Use Public Wi-Fi feature image - picture of a pineapple

Why It’s Safer to Tether Your Internet Than Use Public Wi-Fi

You’ve probably been in a situation where you desperately need an internet connection for your devices while you’re out and about. Most public places offer free internet. Public Wi-Fi, however, is risky business, and it’s best to avoid it. The Risk of Public Wi-Fi Coffee shops, airports, hotels, and restaurants offer their Wi-Fi without a

finger pointing to a padlock - improve your email security tips

11+ Ways to Improve Your Email Security Today

Email accounts are used as the most common point of entry by hackers to get access to networks and either disrupt services, steal information, or spread malevolent software to more accounts. But, if you improve your email security, you can prevent this! So, What Is Email Security? Put simply, email security is a term that

How to Hold an Azure Information Protection Staff Training feature image

How to Hold an Azure Information Protection Staff Training

In light of the latest data security climate, where a risk of a breach is higher than ever, it is of utmost importance to keep valuable data safe. Microsoft’s Azure Information Protection (AIP) helps in achieving this goal and it’s the solution we recommend. Particularly when you consider that the UK average cost of a