Cybersecurity

Category Added in a WPeMatico Campaign

Cybersecurity

CS Hub Mid-Year Market Report 2022

Heightened cyber threats from state-supported groups, the evolution of threat actors’ tactics and the ongoing trend for remote working have combined with the ongoing skills shortages within the cyber security sector to place further pressure on CISOs. The publication of the CS Hub Mid-Year Market Report 2022 offers a timely analysis of trends, innovations and […]

Cybersecurity

How to strengthen email security and protection against advanced ransomware attacks

Cybercrime is evolving and phishing attacks are becoming more targeted. Still, some 75 percent of ransomware attacks continue to originate from email, with attackers working together to hunt down the smallest of openings to generate multi-million-dollar ransoms. Cyber Security Hub’s research reveals that phishing and social engineering attacks remain the biggest threats to organizations in […]

Cybersecurity

Why good email security is essential for business

Threats to email security are on the rise. Without sufficient strategies, companies open themselves, their clients and customers to the consequences of cyber security incidents such as phishing, data breaches and business email compromise (BEC). They must protect this vulnerable asset without compromising its efficiency in communication. These threats to the internal working of the […]

Cybersecurity

PSNI suffers ‘critical’ data breaches

The Police Service of Northern Ireland (PSNI) suffered a “critical incident” on August 8, after the personally identifying information for all of its employees was published online. The “monumental” data breach occurred when data was mistakenly posted online following a Freedom of Information (FoI) request. A database, which included the surname, initials, rank/grade, role and […]

Cybersecurity

The future of cloud security

As organizations around the world prioritize digitization, the focus on cloud security is rapidly growing. Security flaws such as limited visibility, lack of threat detection and response capabilities, and the inability to detect unknown threats or misconfigurations within cloud environments, can all have devastating consequences. Misconfigured cloud resources can cause unintentional data leaks, and an […]