Sep 28, 2018 | Cloud Consultancy News
As of September 2018, it’s been one year since the historical Equifax mega data breach that impacted nearly half of all consumers in the U.S. Since this monumental invasion of personal data, fraudsters have shown little to no notion of slowing down as evident by the...
Sep 27, 2018 | Cloud Consultancy News
Despite their training and best intentions, even the most security-minded employees behave in ways that put the enterprise at risk, according to The Security Culture Report 2018. The report, which covered eight industry sectors, surveyed more than 21,000 employees who...
Sep 26, 2018 | Cloud Consultancy News
Phishing emails are the most common way for criminals to distribute malicious software or obtain sensitive information. Is your business safe from these attacks? We have some tips that you can follow to make sure your business doesn’t become a victim! In a previous...
Sep 25, 2018 | Cloud Consultancy News
Google has quietly changed its policies so that logging into any Google service automatically logs the user into the Chrome web browser. This behaviour apparently began with Chrome 68. It was noticed by bloggers on Hacker News a couple of weeks ago and was recently...
Sep 24, 2018 | Cloud Consultancy News
It has only been a few days since last week’s Patch Tuesday which saw new security updates for all supported versions of Windows 10. And Microsoft is rolling out two new cumulative updates for the two most current versions of Windows 10 – Windows 10 April 2018 Update...
Sep 21, 2018 | Cloud Consultancy News
In surveying 500 small to medium-sized businesses (SMBs) across the US, Webroot discovered that many fail to recognize the many cybersecurity threats their businesses face, in large part because they lack in-house security expertise. According to The 2018 Webroot SMB...
Sep 20, 2018 | Cloud Consultancy News
If you’re one of the people who own a stylus or touchscreen-capable Windows PC, then there’s a high chance there’s a file on your computer that has slowly collected sensitive data for the past months or even years. This file is named WaitList.dat,...
Sep 19, 2018 | Cloud Consultancy News
The new malware tool targeting Windows and Linux systems combines cryptomining, ransomware, botnet, and self-propagation capabilities. Adding to the rapidly growing list of multi-functional malware, a particularly nasty – and unique — data-destroying malware tool has...
Sep 17, 2018 | Cloud Consultancy News
Enterprises are beyond the point of questioning the value of cloud computing to their businesses. However, that doesn’t mean that they can press ahead with their plans without considering how they will protect their apps and data in the cloud. Take Amazon Web...
Sep 14, 2018 | Cloud Consultancy News
Version 8 of Tor Browser, the multi-platform browser that routes traffic through the Tor anonymity network, has been released this week. About the Tor Browser and this latest version The Tor Browser is based on a modified Mozilla Firefox ESR web browser and includes...
Sep 13, 2018 | Cloud Consultancy News
Passwords are beginning to feel like the zombie that just won’t die. Even after Bill Gates famously called for their demise in 2004, this antiquated form of user verification is still alive and kicking. Yet, many remain hopeful that passwords will slowly be phased out...
Sep 12, 2018 | Cloud Consultancy News
At the moment, within the cybersecurity industry the emphasis tends to be on securing networks with perimeter-based protection, however, leaving an application endpoint unsecured means an application programming interface (API) can serve as a gateway to the data...
Sep 11, 2018 | Cloud Consultancy News
Our digital selves, more and more, are becoming part of our full identity. The emails we send, the conversations we have over social media — both private and public — as well as photos we share, the videos we watch, and the websites we visit all contribute...
Sep 10, 2018 | Cloud Consultancy News
Microsoft seems to be toying with two different versions of the simplified ribbon. On the picture above, for example, Word Online has the more modern looking UI for the ribbon, while PowerPoint Online and Word Online below has a different, slightly modern ribbon UI....
Sep 8, 2018 | Cloud Consultancy News
While most tech companies that offer free email services are moving away from email scanning as a source of information for advertisers to target users more efficiently, Oath – the Verizon subsidiary that manages AOL and Yahoo and its webmail offerings – plans to...
Sep 7, 2018 | Cloud Consultancy News
Many British companies are finding it hard to store and manage their company’s data effectively. Seagate polled a representative sample of 1,006 UK SMB employees, asking them about their employers’ data storage practices, preparedness for GDPR, Cyber-Security...
Sep 6, 2018 | Cloud Consultancy News
Facebook-owned WhatsApp has recently announced that, starting on November 12, 2018, Android users will be able to store their WhatsApp backups on Google Drive without the backup being counted toward Google Drive’s storage quota. But, the company warns, those backups...
Sep 5, 2018 | Cloud Consultancy News
Networked printers increasingly are becoming targets of hackers as these devices often aren’t secured by enterprises. A new study cited by Booz Allen Hamilton found that of 61% of survey respondents who reported a data loss incident in 2016, at least 50% had at...
Sep 4, 2018 | Cloud Consultancy News
A recent survey of nearly 200 IT professionals about insider threats found that nearly half of the participants believed they could successfully attack their organisations from the inside. In a blog post earlier this week Imperva researchers reported on insider...
Sep 3, 2018 | Cloud Consultancy News
It has been clear for a while now that passwords no longer provide the user experience or security needed for consumers today. Take the fact that a few months ago, health and fitness app MyFitnessPal, was the latest brand to hit the headlines, as cyber thieves made...