Cloud Consultancy News
You Should Prepare For The Next Mega Data Breach
As of September 2018, it’s been one year since the historical Equifax mega data breach that impacted nearly half of all consumers in the U.S. Since this monumental invasion of personal data, fraudsters have shown little to no notion of slowing down as evident by the...
Security-Minded Employees Still Pose Risks
Despite their training and best intentions, even the most security-minded employees behave in ways that put the enterprise at risk, according to The Security Culture Report 2018. The report, which covered eight industry sectors, surveyed more than 21,000 employees who...
How To Spot A Phishing Email
Phishing emails are the most common way for criminals to distribute malicious software or obtain sensitive information. Is your business safe from these attacks? We have some tips that you can follow to make sure your business doesn’t become a victim! In a previous...
Gmail Users Now Automatically Logged Into Chrome Without Their Consent
Google has quietly changed its policies so that logging into any Google service automatically logs the user into the Chrome web browser. This behaviour apparently began with Chrome 68. It was noticed by bloggers on Hacker News a couple of weeks ago and was recently...
Microsoft Releases New Cumulative Updates for Windows 10 1803 and 1709
It has only been a few days since last week’s Patch Tuesday which saw new security updates for all supported versions of Windows 10. And Microsoft is rolling out two new cumulative updates for the two most current versions of Windows 10 – Windows 10 April 2018 Update...
SMBs Fear Phishing, Fall Short On Cyber Training
In surveying 500 small to medium-sized businesses (SMBs) across the US, Webroot discovered that many fail to recognize the many cybersecurity threats their businesses face, in large part because they lack in-house security expertise. According to The 2018 Webroot SMB...
This Windows File May Be Secretly Hoarding Your Passwords And Emails
If you're one of the people who own a stylus or touchscreen-capable Windows PC, then there's a high chance there's a file on your computer that has slowly collected sensitive data for the past months or even years. This file is named WaitList.dat, and according to...
New Xbash Malware A Cocktail Of Malicious Functions
The new malware tool targeting Windows and Linux systems combines cryptomining, ransomware, botnet, and self-propagation capabilities. Adding to the rapidly growing list of multi-functional malware, a particularly nasty – and unique — data-destroying malware tool has...
Three Steps To Protecting Your Apps And Data On AWS
Enterprises are beyond the point of questioning the value of cloud computing to their businesses. However, that doesn't mean that they can press ahead with their plans without considering how they will protect their apps and data in the cloud. Take Amazon Web...
Tor Browser 8 Is Out: What’s New?
Version 8 of Tor Browser, the multi-platform browser that routes traffic through the Tor anonymity network, has been released this week. About the Tor Browser and this latest version The Tor Browser is based on a modified Mozilla Firefox ESR web browser and includes...