May 31, 2019 | Cloud Consultancy News
Airbnb users may want to check their accounts even if they aren’t planning a trip anytime soon – some fellow customers on the rental site have been scammed with reservations they didn’t make. Account holders have been charged for non-refundable...
May 30, 2019 | Cloud Consultancy News
Cyber security has risen as a key issue on the radar of virtually all organisations. As a recent AT Kearney report suggests, cyber-attacks have been topping executives’ lists of business risks for three straight years. In fact, the overwhelming majority of...
May 29, 2019 | Cloud Consultancy News
Networks need regular cleaning just like your home, car or garage. Why? The answer is simple – poor security hygiene can lead to major data breaches. If you don’t regularly review your network, potential weaknesses and vulnerabilities will stack up. As we enter into...
May 28, 2019 | Cloud Consultancy News
Employees are aware of the risks associated with inadequate USB drive security – yet their employers aren’t mandating following best practices, according to a report by Apricorn. “The State of USB Data Protection 2019: Employee Spotlight” survey report, which polled...
May 27, 2019 | Cloud Consultancy News
Improving configuration management in Software-as-a-Service (SaaS) applications can minimize the risk of data loss, phishing campaigns and prevent breaches. How can the IT team put up guardrails for users? Defaults Make Life Easy–for Hackers Widely-used cloud...
May 24, 2019 | Cloud Consultancy News
General Data Protection Regulation, or GDPR, is here. Here’s what it means, how it impacts individuals and businesses – and how to ensure compliance. What does GDPR stand for? GDPR stands for General Data Protection Regulation. It’s the core of...
May 23, 2019 | Cloud Consultancy News
Apple updated MacBook Pro with faster 8th- and 9th-generation Intel Core processors, bringing eight cores to MacBook Pro for the first time. MacBook Pro now delivers two times faster performance than a quad-core MacBook Pro and 40 percent more performance than a...
May 22, 2019 | Cloud Consultancy News
Technology is both boon and curse for the world. While businesses across the globe are taking stringent methods to ensure safety of financial credentials and identity, the cyber criminals are posing new challenges. It is quite true, technology advancement has...
May 21, 2019 | Cloud Consultancy News
IT leaders in the United States are putting business data at risk by not effectively managing employees’ passwords, according to OneLogin research. Despite the fact that 91% report they have company guidelines in place around password complexity, and 92% believe their...
May 20, 2019 | Cloud Consultancy News
Google has added a control option to users’ accounts that will allow them to instruct the company to auto-delete their location history, browsing and search data once a certain length of time has passed. “Choose a time limit for how long you want your activity data to...
May 17, 2019 | Cloud Consultancy News
Microsoft has announced new privacy controls for Microsoft 365 enterprise customers: they will be able to revoke access to encrypted emails, block sensitive information from being shared or leaked when using Teams, use new data investigation capabilities and improve...
May 16, 2019 | Cloud Consultancy News
Orange has agreed to acquire SecureLink to tap into the growing enterprise cybersecurity market in Europe. The deal was agreed for €515 million ($577m), the telecommunications giant said on Tuesday 7th May. Founded in 2003, Netherlands-based SecureLink, previously...
May 15, 2019 | Cloud Consultancy News
The leaky database also kept a track of users who clicked on messages through Grand Slam Marketing, another small advertising company. The data exposed in the incident includes MD5-hashed emails, IP addresses, Phone numbers, and ZIP codes. ApexSMS Inc., an SMS text...
May 14, 2019 | Cloud Consultancy News
Phishers are continually coming up with new tricks to get users to click on malicious links and share sensitive login information. Enterprise phishing attacks predominantly take the form of simple credential phishing emails, i.e., attempts to trick an employee into...
May 13, 2019 | Cloud Consultancy News
Unsurprisingly, 78% of micro and small businesses, and 92% of medium-sized businesses, now say that cyber security is a high priority. With this in mind, here are five things that SMEs can do to make their cyber security better without spending a penny. Remember...
May 10, 2019 | Cloud Consultancy News
New tools, such as Compliance Manager and Advanced Message Encryption, aim to give businesses more options for data privacy. Microsoft is rolling out a series of new capabilities designed to give businesses greater control over their data privacy practices, help meet...
May 9, 2019 | Cloud Consultancy News
Advice for organisations on implementing multi-factor authentication (or two-factor authentication) to protect against password guessing and theft on online services. This guidance describes how to use multi-factor authentication (MFA) to mitigate against password...
May 8, 2019 | Cloud Consultancy News
How setting up 2FA can help protect your online accounts, even if your password is stolen. Introduction This guidance explains how you can set up two-factor authentication (2FA) on your important online accounts. Doing this makes it harder for criminals to access your...
May 7, 2019 | Cloud Consultancy News
Guidance for organisations deploying a range of end user device platforms as part of a remote working solution Introduction Modern smartphones, laptops and tablets provide users with great flexibility and functionality, and include security technologies to help...
May 6, 2019 | Cloud Consultancy News
Image Credit: Shutterstock New research from Hiscox has revealed that the proportion of UK firms reporting cyberattacks has jumped despite most businesses admitting they are under-prepared for breaches. The insurer surveyed over 5,400 small, medium and large...
May 3, 2019 | Cloud Consultancy News
Google has launched Chrome 74 for Windows, Mac, Linux, Android and iOS, bringing with it a bunch of handy new features, although some – such as Incognito detection blocking – require a bit of tinkering to access. Straight out of the box, though, is motion...
May 2, 2019 | Cloud Consultancy News
Overview Emotet is an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware affecting state, local, tribal, and territorial (SLTT)...
May 1, 2019 | Cloud Consultancy News
As our reliance on technology grows, so does our need for improved cybersecurity. With so much of our personal information stored in our devices, simply browsing online or enabling certain settings on your smartphone may be leaving you vulnerable to hackers. Of...