Cloud Consultancy News
The haphazard response to COVID-19 demonstrates the value of enterprise risk management
Just 12% of more than 1,500 respondents believe their businesses are highly prepared for the impact of coronavirus, while 26% believe that the virus will have little or no impact on their business, according to a survey by Gartner. “This lack of confidence shows that...
Avast AntiTrack Flaw Allows MitM Attacks on HTTPS Traffic
A vulnerability in Avast’s anti-tracking solution could allow malicious actors to perform man-in-the-middle (MitM) attacks on HTTPS traffic, a security researcher has discovered. The security flaw, which impacts both Avast and AVG AntiTrack, as they share underlying...
What Is Microsoft Teams, and Is It Right for My Business?
Microsoft Teams is the company’s answer to the need for user-friendly digital collaboration software in the modern workplace. It competes with Slack and will replace Skype for Business as the premier platform for remote teleworking. What Is Microsoft Teams? Microsoft...
Variant of Paradise Ransomware Targets Office IQY Files
Threat actors can easily infiltrate networks because attacks evade detection by typical security protections. A new variant of the Paradise ransomware attacks rarely-targeted Microsoft Office Excel IQY files, providing a new and relatively inobtrusive way to...
Ring app for Android full to the brim with third-party trackers
The Electronic Frontier Foundation (EFF) has published the results of an investigation into the Android version of the Ring app which reportedly includes a plethora of trackers sending out customer data to third parties. On Monday, the digital rights group said Ring...
Ransomware victims thought their backups were safe. They were wrong
The UK's cybersecurity agency has updated its guidance on what to do after a ransomware attack, following a series of incidents where organisations were hit with ransomware, but also had their backups encrypted because they had left them connected to their networks....
How to Check If Your iPhone Was Refurbished
After buying a used iPhone, you might wonder about its history. When first sold, did it leave Apple as a brand new device or one that had been previously refurbished? Luckily, there’s an easy way to tell. Here’s how. Find Your iPhone’s Model Number Open the Settings...
Ransomware Detections Surged 10% in 2019
Trend Micro blocked over 52 billion unique cyber-threats in 2019, 61 million of which were ransomware, according to its annual roundup report. The security firm revealed that email remained by far the most popular threat vector, accounting for 91% of all threats. It...
One in five UK & US SMBs use no endpoint security at all
An alarming number of SMBs (small to medium businesses) in the US and UK are not prepared for a potential cyber attack or breach, BullGuard warns. One-third of companies with 50 or fewer employees report using free, consumer-grade cybersecurity, and one in five...
Message Centre Major Change Update Notification – COVID-19 Business Continuity
Source: Microsoft Office 365 Message centre Microsoft takes a broad approach to service continuity, including potential effects of an outbreak such as COVID-19. While there is currently no foreseen impact to Microsoft’s operation of our services, we wanted to provide...