Public WiFi lets you work outside the office and provides a cheap alternative to mobile broadband. But it is vulnerable to hackers, so if you’re conducting business (or using it for sensitive personal communications) then you need to take precautions.
Plagued by cyber attacks and skills shortages in the midst of political turmoil, many bosses underestimated threats in 2017 – and overestimated their own recovery capability. That’s why it’s time to gear up for some inevitable challenges this year.
Phishing scams have taken Britain by storm, ruthlessly using our very nature against us. As Karla Burnett, an engineer for mobile payments company Stripe, suggested at Black Hat 2017, we’re just fantastically human.
Daren Howell, business continuity expert at Sungard Availability Services, looks at how businesses are extremely relaxed or dangerously unaware of the changing responsibilities and liabilities around compliance.
The evidence is clear, hacking can result in serious financial damage to a business. However, high-profile hacking episodes are not being heeded by SMEs.
A look at minimising the risk of phishing attacks as the numbers continue to grow, affecting businesses and individuals alike.
It’s summertime! Which also means it’s a time for family, fun and travel. The chances are, you’ll be taking your laptop wherever you go, and of course, you’ll be taking your smartphone – do not forget to be cyber-safe.
It was recently reported that hackers posed as Microsoft staff to obtain passwords from MPs. Blamed on human error, and the result of “weak passwords”, the Parliament attack showed humans can often be the weakest link in cyber security.
Our history is filled with cyber risk incidents, stretching back to the HMRC CD-ROM debacle, through to software vulnerabilities like Heartbleed and WannaCry. If anything, it highlights the need for companies to take serious steps to mitigate the impact of future attacks.
Cloud infrastructure – it’s been the talk of the town amongst industry insiders, businesses and pretty much anyone who knows how to use a computer.
Mergers and acquisitions are complicated. No matter how similar the two parties are, joining them together is always an intricate, complex task – so cyber security due diligence is required.
A simple solution for improving the day-to-day activities of the workforce could be by taking a sensible approach to technology innovation.