fbpx

Cybersecurity & IT Threats

Expanding ‘IT Threats’ to include various aspects of cybersecurity, not just threats.

Electoral Commission failed cybersecurity test in same year as hack | Electoral Commission | The Guardian

Electoral Commission failed cybersecurity test in same year as hack | Electoral Commission | The Guardian

The Electoral Commission has admitted it failed a cybersecurity test in the same year hackers successfully attacked the organisation. The UK’s elections watchdog said it did not pass a Cyber Essentials test, a voluntary government-backed scheme that assesses an organisation’s readiness against cyber-attacks. The commission said it failed the test in 2021, when it was

Electoral Commission failed cybersecurity test in same year as hack | Electoral Commission | The Guardian Read More »

Shield representing protection against malware and ransomware

Navigating the Future of Data Protection: Addressing Reality Gaps and Long-term Retention Challenges

Introduction Hello again, I’m Richard Giddey, VP for the Asia-Pacific region at Actiphy. With an extensive history in storage and backup, I’ve been in the industry’s trenches, seeing its evolution firsthand. Today, let’s explore another critical dimension that directly impacts your data protection strategy—Data Protection. The Imperative of Long-term Data Retention Why Long-term Data Retention

Navigating the Future of Data Protection: Addressing Reality Gaps and Long-term Retention Challenges Read More »

Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs

Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs

In March 2022, the Securities and Exchange Commission (SEC) proposed a rule on cybersecurity disclosure, governance, and risk management for public companies, known as the Proposed Rule for Public Companies (PRPC). This rule would require companies to report “material” cybersecurity incidents within four days. It would also require that boards of directors have cybersecurity expertise.

Proposed SEC Cybersecurity Rule Will Put Unnecessary Strain on CISOs Read More »

National Cybersecurity Alliance Receives 200K Grant From Craig Newmark Philanthropies for HBCU Cybersecurity Program

National Cybersecurity Alliance Receives 200K Grant From Craig Newmark Philanthropies for HBCU Cybersecurity Program

August 28, 2023- WASHINGTON – The National Cybersecurity Alliance (NCA) today announced it has received a significant boost in funding from Craig Newmark Philanthropies. The $200,000 grant will support ongoing initiatives within NCA’s Historically Black Colleges and Universities (HBCU) Cybersecurity Career, Mentoring, and Scholarship Program, as students return to school. Launched in 2022, the ‘See Yourself In

National Cybersecurity Alliance Receives 200K Grant From Craig Newmark Philanthropies for HBCU Cybersecurity Program Read More »

Fake Signal and Telegram apps sneak malware into thousands of Android phones — delete these right now | Tom's Guide

Fake Signal and Telegram apps sneak malware into thousands of Android phones — delete these right now | Tom’s Guide

Hackers have developed a sneaky new tactic to push malware onto your phone and snoop on your conversations. Researchers at the cybersecurity firm ESET found fake apps in the Google and Samsung app stores that posed as extensions or premium versions of the popular messaging platforms Signal and Telegram designed to steal user data.  The

Fake Signal and Telegram apps sneak malware into thousands of Android phones — delete these right now | Tom’s Guide Read More »

Everest Group Research: C-Suite Must Recognize Critical Difference Between Cybersecurity and Cyber Resilience

Everest Group Research: C-Suite Must Recognize Critical Difference Between Cybersecurity and Cyber Resilience

DALLAS, Aug. 29, 2023 /PRNewswire-PRWeb/ — Everest Group is calling on enterprises to make the critical shift in focus from cybersecurity to cyber resilience. While cybersecurity focuses on safeguarding against threats, cyber resilience emphasizes the ability to withstand, respond and recover quickly from them. Everest Group issues this call to action in its recently published “State of the

Everest Group Research: C-Suite Must Recognize Critical Difference Between Cybersecurity and Cyber Resilience Read More »

Do not be held for ransom. Invest in ActiveImage Ransomware Protector today!

MSPs: Are You Protected Against Ransomware in 2019?

Ransomware is a tool that cyber-criminals use to infiltrate computer servers, desktops, laptops and other mobile devices. This malicious software then encrypts a company’s critical files and web properties and holds them for ransom until the company or organisation pays the requested amount (usually through cryptocurrency), on which the cyber-criminal will release the company’s digital

MSPs: Are You Protected Against Ransomware in 2019? Read More »

What is a Blended Attack?

Blended attacks combine multiple threats into a single attack to leave a networked computer completely compromised. Normal cyber attacks tend to have only one attack vector, but blended attacks will use multi-pronged strikes to exploit any vulnerabilities. Security and IT personnel have a difficult time trying to deal with a blended attack as they hit

What is a Blended Attack? Read More »

2018’s Most Common Cyber Attacks

With the year drawing to a close and the holidays fast approaching, we take time to look back at the cyber attacks that dominated the world of cyber crime in 2018. By understanding the main tactics used by cyber criminals this year, we can predict and become more prepared for next year’s threats.   5

2018’s Most Common Cyber Attacks Read More »

Scroll to Top