If you aren’t currently GDPR compliant then you could be heading for trouble.
At the beginning of 2018 everyone was talking about GDPR, how would it affect their business? What would it mean for marketing? Was anyone fully compliant? Was it good news or bad news for businesses?
The enforcement da…
Week 1 - Practice basic cyber hygiene
Reducing your exposure to a cyber attack
Effective and affordable ways to reduce your organisation’s exposure to the more common types of cyber attack.
- Boundary firewalls and internet gateways - establish network perimeter defences, particularly web proxy, …
Charities need to be just as vigilant as a business
Many charities, particularly smaller ones, do not realise the value of the personal, financial, commercial and other data they hold, according to a report by the National Cyber Security Centre (NCSC).
Charities typically do not perceive themselv…
Historically, cyber criminals used phishing tactics, and sent emails to try to dupe unsuspecting victims. These were mass email campaigns with a low success rate. Today, however, attackers carry out targeted and focused tactical email campaigns as part of spear phishing attacks. This …
Is the Torii botnet the most sophisticated IoT botnet ever?
Security researchers have uncovered a new botnet targeting Linux-based devices that’s more sophisticated than most other IoT botnets seen before.
What is a botnet?
A botnet is “a collection of any type of internet-connected device that a…