Cloud Consultancy News
Types Of Malware
This means that the question of, say, what the difference is between malware and a virus misses the point a bit: a virus is a type of malware, so all viruses are malware (but not every piece of malware is a virus). There are a number of different ways of categorizing...
What is Malware?
Malware—a blanket term for viruses, worms, trojans, and other harmful computer programs—has been with us since the early days of computing. But malware is constantly evolving and hackers use it to wreak destruction and gain access to sensitive information; fighting...
Cyber Security – Security Investments Guarantee Success
Technology is evolving at such a rapid rate that the parameters of security practices are in constant flux too. Security measures that were thought to be sufficient in 2017 may already be outdated, and this rate of change is only set to further accelerate this year...
Cyber Security – Investing In Expert Skillsets And Talent
Underpinning both these challenges is the issue of finding the right expertise. And, as the threat environment evolves, this will become an even bigger problem for businesses. Of course, it’s not as simple as employing more staff – as well as headcount issues,...
Cyber Security Should Now Be A Strategic Business Priority
Cyber-attacks are continuing to increase and evolve at an alarming rate. In just the last few weeks, we’ve seen the personal data stolen from accounts of 21 million Timehop users and 40,000 UK customers of Ticketmaster. Such breaches highlight how cyber threats have...
Cyber Hygiene: Where Do Organisations Fall Behind On Basics?
Tripwire released its State of Cyber Hygiene report, which examined how organisations are implementing security controls that the Center for Internet Security (CIS) refers to as cyber hygiene. The survey found that almost two-thirds of the organisations admit they do...
Samsung Is Building A High-Speed 4TB SSD For Everyone
When Samsung unveiled its first-ever 1-terabit flash chip, it promised that massive SSD storage devices would soon follow. As promised, it's now producing 4TB SSDs, and best of all, these drives are not for cloud companies or enterprises. "Samsung's new 4-bit SATA SSD...
You Should Still Care About GDPR
In the days leading up to May 25, email inboxes were filled with updated privacy notices and requests for marketing consent. Web browsers saw more banners about “cookies” than they had since broadband became ubiquitous, and businesses began to consider how they were...
Rise In Email Impersonation Attacks Makes Companies Re-assess Their Security Efforts
Most companies believe they’ve experienced serious data breaches driven by email impersonation in the past 12 months – but are not doing nearly enough to prevent future impersonation attacks, according to a new study conducted by the Ponemon Institute. “With the...
What Is EMM And How Can It Help With Mobile Security?
Enterprise Mobility Management (EMM) is the process of leveraging people and technology to secure sensitive data present on employee devices. EMM automates security configurations on devices so they’re ready for corporate use. It also enables you to keep security...