Cloud Consultancy News
Microsoft Is Now A Top Five PC Maker In The US Thanks To Surface
Microsoft has broken into the top five PC makers in the US for the first time. Market research firm Gartner revealed that Microsoft now holds 4.1 percent of the US PC market, edging out Acer for the fifth spot. It’s the first time Microsoft has entered the top five in...
Hook, Line and Sinker: After Phish Get Caught
Phishing is nearly as old as email, but it is still a major attack vector for cybercriminals. Some of the most prominent cyber incidents of the past few years are the result of phishing attempts. Despite the maturity of this problem, the solutions proposed by the...
Keeping Your Cloud Malware-Free: What You Need To Know
This year we’ve seen massive malware attacks spanning from nation state campaigns originating in North Korea and Russia to popular restaurants and everything in between. Each new incident serves as a grim reminder to business leaders that hackers will not relent. Yet...
MacOS Mojave – New Features
Software updates can seem like a chore, but they’re really an underrated perk of the gadget world. New hardware, like phones, cost money to upgrade. But new software is typically free, and ideally makes your device, or even just your web browser, better. Apple has...
Components of Every Good Cybersecurity Plan – 3 of 3
Business Continuity and Disaster Recovery Last but certainly not least, a good cybersecurity plan focuses on more than prevention. It’s also concerned with mitigation. Should the worst happen and your business find itself under threat, how will you respond? How will...
Components of Every Good Cybersecurity Plan – 2 of 3
A Focus On The Right Tools Armed with an understanding of your business’s unique threat profile and its employees distinctive needs, you can then reposition infrastructure and software planning as more of a collaborative process – not, in other words, the sole domain...
Components of Every Good Cybersecurity Plan – 1 of 3
No matter your business’s size, you are a target for someone. Cybercriminals are now more numerous than ever, and they have a threat surface larger than any we’ve ever seen to exploit gleefully. And they aren’t the only risk to your organization’s assets, either –...
The Double-Edged Sword of Open-Source Code
While open code repositories can increase efficiency in R&D, they also raise issues of security vulnerabilities. Today’s developers are under pressure to deliver new software at an increasingly rapid pace, leading to the more frequent use of open source code, with the...
When Good Apps Go Bad: Protecting Your Data Through App Permissions
When was the last time you thought about what permissions the apps on your phone have? Often, when downloading something new from the app store, many people somewhat blindly accept the various pop-ups that ask to allow the app access to their phone’s data; more...
Organisations Are Beginning To Find Cyber Threats More Effectively
Today, the SANS Institute Threat Hunting Survey report concludes that organisations are beginning to find cyber threats more effectively. However, whilst techniques, tools and the scope of threat hunting is expanding, the practice is still relatively poorly defined...