Estimated reading time: 3 minutes
Sometimes, the biggest dangers come from within. As organizations cope with the changing world of cybersecurity which continues to evolve at a frantic pace, they sometimes forget to neglect the danger that stares at them in their face. The...Estimated reading time: 3 minutes
Increasingly, hacker and other malicious criminals are increasing email attachments to inject malware into their targets. Malware disguised as an email attachment represents an easy target – the recipient of the mail may unknowingly open the attachment without even...Estimated reading time: 3 minutes
Thanks to the widespread coverage that the WannaCry and the Petya attacks received in 2017, ransomware is no longer an unknown or misunderstood terms, especially for those whose work revolves around handling cybersecurity. In fact, ransomware – which basically refers to...Estimated reading time: 2 minutes
A big headache which all network administrators have is the vulnerability status of their business. With more and more business being conducted online, every organization has an online presence and network. Popular software attracts the attention of malicious criminals...Estimated reading time: 3 minutes
Last year we saw two high-profile ransomware attacks strike within a few weeks of each other, affecting more than a quarter million machines worldwide and causing major disruptions. With the adoption of the Eurocard/Mastercard/Visa payment standard increasing, credit card...