The Mimecast Threat Center launched the Threat Intelligence Report: RSA Conference Edition, finding a 145% increase in attack campaigns across the globe from October to December. Researchers believe the increase can be attributed to Emotet’s renewed activity after four months of relative dormancy, coupled with cybercriminals’ higher rates of activity due to the holiday shopping season. From October
by Mark Jow, Commvault Technology constantly evolves — so data management should too The vast majority of businesses today acknowledge that their data is important, even critical to their operations. Despite this, however, many organisations fail to take adequate measures to safeguard this crucial asset. With data breaches caused by cyber-attacks on the rise, protecting
With the 2020 tax season underway, cybersecurity analysts are seeing an increase in the number of impersonation attacks focused on stealing personal information through voice phishing, texts, and email. According to the Daily Mirror and other news sites, taxpayers are at their most vulnerable during income tax self-assessments due to uncertainties over filing processes. Other
It’s a new year. Like many of you, on New Year’s Eve, I gathered with friends and family in the countdown to midnight and joined people in singing, “Should Auld acquaintance be forgot, and never brought to mind.” Well, if you want to forget about your old acquaintances, that’s your choice. But here’s something you
Results of a global study of 3,100 IT managers in 12 countries. Network security is the bedrock of every organization’s cyber defenses, the foundation on which other protection services such as endpoint, server, mobile and encryption are layered. It’s the trusty work horse that plays a pivotal role in keeping organizations moving. To better understand
CIOs: Does your network keep you up at night? It should. What keeps CIOs up at night? According to CIO Magazine’s annual survey of CIO concerns, everything from security threats, to data protection, to the skills gap to digital transformation are top-of-mind. What’s not on their list? Their networks. The heart of the concerns they
The increasingly digital global economy has created a “perfect storm” for cyber attackers. As our reliance on websites and email to interact with organizations has grown, so too has the opportunity for criminals who are increasingly preying on the trust we have in these organizations. Sophisticated attackers are hoodwinking their targets by posing as trusted
by Scott Tyson, Managing Director, EMEA, Auvik Networks The Simpsons has made some eerily accurate predictions over the years. And we’re willing to bet there are tons of employees who have that classic Bart Simpson reaction when they’re asked about gaming, streaming Netflix, or accessing other banned applications at work: “I didn’t do it, nobody saw
The WatchGuard AuthPoint solution addresses a common security gap with multi-factor authentication (MFA) on an easy-to-use Cloud platform. With a simple push notification, the AuthPoint mobile app makes each login attempt visible, allowing the user to accept or block access right from their smartphone. Furthermore, AuthPoint is a Cloud service, so there’s no expensive hardware
by Scott Tyson, Managing Director, EMEA, Auvik Networks From smart locks, lightbulbs, mirrors, and thermostats to connected contact lenses, activity trackers, and the list goes on—there seems to be a smart version of everything these days. And they’re not all for personal use. As we’re lining up to buy the latest, greatest IoT (Internet of
Data protection and governance requirements are something of a moving target for IT departments at the moment. Whether it’s trying to manage backups from multiple clouds, virtual machines, applications and databases, or endpoints or any combination of them, there’s a lot of moving parts to be considered. On top of that there’s the need to
Pace Technology UK Limited, a leading supplier and installer of vehicle communications systems selected PAV I.T. Services for their email security solution to protect against advanced email-borne threats. PAV provide organisations across the UK with security solutions to protect against data loss, cyber threats and better manage data risk. Contact us to see how we can help your organisation. Visit Pace Technology
- 1
- 2