Microsoft on the counter-attack!

Microsoft on the counter-attack! Trickbot malware network takes a hit
In theory, this takedown will greatly reduce the ability of the crooks to get malware onto your computer, and also limit their ability to...

Read more...
Home Technology

8 tips to tighten up your work from home network
We’ve come up with eight questions you can ask yourself about devices on your home network, about the setup of your network, to help...

Read more...

Phishing tricks – the Top Ten Treacheries of 2020
Sophos Phish Threat, in its own words, is a phishing attack simulator – it lets your IT department send realistic-looking fake phishes to your...

Read more...

Russian cybercrime suspect arrested in $1M ransomware conspiracy
When we write about network-wide ransomware attacks where a whole company is blackmailed in one go, two burning questions immediately come up: How much...

Read more...
Cybersecurity Awareness

Cybersecurity Awareness and Tips
Cybercriminals are relentless. The more business protects themselves the more cybercriminals prey on that which the business cannot directly control – the behaviors of...

Read more...
Business Email Compromise

Business Email Compromise – What it is and how AI Technology can stop and detect fraud.
Business Email Compromise (BEC), is a form of targeted phishing where attackers disguise themselves as senior executives to dupe employees into doing something they...

Read more...
BootHole bug

Servers at risk from BootHole bug
Another month, another BWAIN! That’s our tongue-in-cheek name for a cybersecurity vulnerability that not only gets assigned an identifier like CVE-2020-10713, but also acquires an...

Read more...
ProLock Ransomware

ProLock Ransomware Threat
As you can imagine, law enforcement and government bodies around the world regularly say, “No! Please don’t, because it’s the regular payments that make...

Read more...
Cybersecurity During COVID-19 

Cybersecurity During COVID-19: Impact and Solution
Running a business requires much planning. Strategy, policy, goals, products, and services need to be considered regularly along with who, why and how to...

Read more...