Cloud Consultancy News
IBM Ransomware Research: Attacks Tripled In Q2 to 33% Of All Incidents
It’s no surprise that ransomware threat actors have adjusted their attack models to match improvements that organizations’ security defenders are making. But the extent of that shift is eye-opening. As of September 2020, one in four attacks IBM Security X-Force...
Rising reports of fraud signal that some COVID-related schemes may just be getting started
As the economic fallout of the COVID-19 crisis continues to unfold, a research from Next Caller, reveals the pervasive impact that COVID-related fraud has had on Americans, as well as emerging trends that threaten the security of contact centers, as we head towards...
Cybersecurity lessons learned from data breaches and brand trust matters
Your brand is a valuable asset, but it’s also a great attack vector. Threat actors exploit the public’s trust of your brand when they phish under your name or when they counterfeit your products. The problem gets harder because you engage with the world across so many...
Cybersecurity is a top priority for digital transformation
Cybersecurity is the number one technology priority for planned digital transformation projects as businesses adapt to a surge in remote working as a result of COVID-19. Cybersecurity: Main focus for planned projects IT leaders also revealed that adapting culture...
How vital is cybersecurity awareness for a company’s overall IT security?
The benefits of cybersecurity awareness programs are currently the subject of broad discussion, particularly when it comes to phishing simulations. Nowadays, companies not only invest in IT security solutions, but also in the training of their employees with the goal...
30 plus Hidden Google Search Games and Easter Eggs
Google has hidden lots of quirky Easter eggs and fun games in its search engine. Below are some of the best, so just head to Google and type one of the following searches. Search: Anagram Did you mean nag a ram? Not exactly. An anagram is a word (or phrase)...
Vishing At The Ritz: There’s A New Type Of Cybercrime In Town
There's another clever fraud tactic to add to your library of security threats. Imagine a call or voice message that appears to come from a trusted source but is really a disguised attempt to compromise your identity, credentials or financial information. More...
SMBs seeking service providers in face of rising cyber threats
SMBs are struggling with their cybersecurity solutions, with three quarters worried about being the target of a cyberattack in the next six months, and 91% considering using or switching to a new IT service provider if offered a better option. This is according to the...
Microsoft brings endpoint & Azure security under Microsoft Defender
The Microsoft security platform formerly known as Microsoft Threat Protection has a new name and new capabilities, announced at Microsoft Ignite last week. The new name, Microsoft Defender, brings Microsoft 365 Defender and Azure Defender under the same umbrella....
10 things you need in an email security service
Eradicating email entry Email is still the most used attack vector for opportunistic and targeted attacks and is typically the starting point for social engineering attacks, the delivery vehicle for a dropper or payload attachment, or the link to an exploit kit or...