This is how diverse teams can help combat cyber-attacks
Thought employee diversity and effective cybersecurity weren’t linked? Well they are, this is how it can help you better safeguard your business.
Thought employee diversity and effective cybersecurity weren’t linked? Well they are, this is how it can help you better safeguard your business.
It’s ‘cybersecurity month’ where businesses are encouraged to learn how to better protect their data, is it time to go back to the first ‘cyber-scare’ of them all ? and see what we can learn?
The frequency and cost of reported cyber attacks on SMEs are growing, how can they better protect themselves?
Hacker threats are getting more sophisticated. But that doesn’t mean that cyber-security solutions have to be difficult to implement or tricky to use, says tech entrepreneur Jonathan Craymer.
SMEs are being warned to ensure their cyber security credentials stand up to scrutiny or else they could risk losing hard-won business.
The contract to manufacture the UK?s post-Brexit blue passport was recently awarded to Franco-Dutch outfit, Gemalto, over incumbent British firm, De La Rue. A political storm ensued, leading to sections of the media and readers to describe the decision as treasonous.
Kemi Badenoch admitted to hacking another MP’s website as a prank, before she was elected. But while she may have been forgiven for the deed, it has flung the?CMA back into headlines.
Why are some SMEs still snoozing in the face of cybersecurity shortcomings? Matt Burton, chief client officer for Ignata discusses how good cybersecurity protocols win business.
Paul Rosenthal, founder of Appstractor, takes a closer look at the security risk to businesses caused by employees side-stepping cyber protocols, failing to configure or install software correctly.
Cyber threats are only going to get worse from here, experts claim. However, bosses seem to currently be investing in the wrong areas.
While technology enabled the UK workplace to evolve, it has also allowed hackers to be more creative in the way of data breaches.