Security
A guide to cyber security certification and training

A guide to cyber security certification and training
Cyber security is in demand from every organisation, but what training and certification is needed?
22 Apr 2021
What is hacktivism? 

What is hacktivism?
From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
22 Apr 2021
Geico data breach leads to stolen driver’s license numbers

Geico data breach leads to stolen driver’s license numbers
Monthslong hack meant fraudsters could apply for unemployment benefits in victims’ names
21 Apr 2021
UK’s IoT security regulation will also include smartphones

UK’s IoT security regulation will also include smartphones
Manufacturers will be required to inform consumers how long their device will receive security software updates
21 Apr 2021
eBay, Apple, Microsoft, Facebook, and Google were phishers’ top targets in 2020

eBay, Apple, Microsoft, Facebook, and Google were phishers’ top targets in 2020
Phishers also making more use of HTTPS in attacks
20 Apr 2021
Mastering endpoint security implementation

Mastering endpoint security implementation
More devices connecting to the corporate network means more security risks. Here are some of the ways to protect your business
16 Apr 2021
US, UK say Russia was behind SolarWinds hack

US, UK say Russia was behind SolarWinds hack
President Joe Biden issues sanctions against 32 entities and officials, as well as expelling 10 diplomats
16 Apr 2021
Biden looks to shore up the electrical grid’s cyber security

Biden looks to shore up the electrical grid’s cyber security
Participation will be voluntary, but incentives may push adoption
15 Apr 2021
Top US credit unions have multiple web app security problems

Top US credit unions have multiple web app security problems
One in ten web applications running on old components that contain known vulnerabilities
15 Apr 2021
1Password targets enterprise customers with Secrets Automation

1Password targets enterprise customers with Secrets Automation
Acquisition lets password manager integrate with enterprise infrastructure
14 Apr 2021
PowerShell threats increased over 200% last year

PowerShell threats increased over 200% last year
A new McAfee report finds PowerShell attacks driven largely by Donoff malware.
14 Apr 2021
Russia launched over a million cyber attacks in three months

Russia launched over a million cyber attacks in three months
Unit 42 researchers found 75% of the attacks were critical
13 Apr 2021
New DNS vulnerabilities put millions of IoT devices at risk

New DNS vulnerabilities put millions of IoT devices at risk
The NAME:WRECK flaws affects four popular TCP/IP stacks
13 Apr 2021
Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
Each of these popular cloud platforms boasts robust security - but which does it best?
13 Apr 2021
5G will accelerate cyber crime, predicts former White House CIO

5G will accelerate cyber crime, predicts former White House CIO
Speaking at Aruba Atmosphere '21, Payton warned the technology will lead to "massive cyber attacks" this year
13 Apr 2021
How to encrypt files and folders in Windows 10

How to encrypt files and folders in Windows 10
Here’s how to make your sensitive data unreadable to prying eyes
9 Apr 2021
The definitive guide to IT security
The definitive guide to IT security
Protecting your MSP and your customers
9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack

Evidence suggests REvil behind Harris Federation ransomware attack
The trust’s financial records have been discovered on a dark web site known to be operated by the infamous group
9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories

Fujitsu taps Trend Micro to secure private 5G networks in smart factories
Trend Micro’s 5G security solution identifies vulnerabilities and suspicious network behaviors
8 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts

Hackers are using fake messages to break into WhatsApp accounts
Hackers are posing as friends to gain users' trust
8 Apr 2021
What is Microsoft Pluton?

What is Microsoft Pluton?
A quick look at Microsoft's new approach to CPUs that promises to revolutionise Windows security
8 Apr 2021
BCDR buyer's guide for MSPs
BCDR buyer's guide for MSPs
How to choose a business continuity and disaster recovery solution
7 Apr 2021
The business guide to ransomware
The business guide to ransomware
Everything you need to know to keep your company afloat
7 Apr 2021