Cloud Consultancy News
IT teams forced into compromising security for business continuity during pandemic
IT teams have been forced into compromising security for business continuity at a time of rising threats, a HP report reveals. Making matters worse, their attempts to increase or update security measures for remote workers have often been rejected. This is...
The iPhone 13 and iPhone 13 mini
Introduced on September 24, the iPhone 13 and iPhone 13 mini are Apple's newest flagship iPhones on the more affordable end, and are being sold alongside the more expensive iPhone 13 Pro and iPhone 13 Pro Max. The iPhone 13 and iPhone 13 mini are ideal for those who...
Only 30% of enterprises use cloud services with E2E encryption for external file sharing
A recent study of enterprise IT security decision makers conducted by Tresorit shows that majority of enterprises use additional encryption methods to boost the security of cloud collaboration and file transfer, however, tools with built-in end-to-end encryption are...
Crypto exchanges and their customers must protect themselves as attacks continue
Within the past several years, cryptocurrency has gone from a niche hobby to a mainstream concern. Cryptocurrencies like Bitcoin, Ethereum, and even Dogecoin have generated widespread interest, particularly as their value has risen. This interest has penetrated well...
Your SSD may soon be able to detect ransomware attacks
Academic researchers have conjured up a novel idea to thwart ransomware attacks using firmware that can block write access to solid-state disks (SSD) as soon as it detects patterns matching such an attack. The idea about the intelligent firmware, dubbed SSD-Insider++,...
5G and Cybersecurity – A Realistic Path Forward
5G Technolgy has been increasing in popularity among the telecom companies creating it and organizations that consume wireless networks. The reasons for this are not trivial. It is expected that in 2022, the total data traffic across mobile networks will reach 77...
Securing your WordPress website against ransomware attacks
It’s no surprise to anyone who works in security that there’s been an explosion in ransomware incidents over the last two years, costing companies across various industries millions of dollars. According to a recent report from the Institute for Security and...
Why cybersecurity and regulatory compliance are one and the same
Cybersecurity and regulatory compliance are no longer two largely separate issues as they have often been considered Across any industry, cybersecurity and regulatory compliance are crucial areas for business leaders to keep on top of. Both present a set of diverse,...
Half of APAC firms bypass processes to accommodate remote work
Some 56% of Asia-Pacific businesses admit to sidestepping digital processes to accommodate remote or flexible work arrangements. This despite 48% expressing increased concern about their company's ability to manage security threats. The latter figure was higher than...
How to Prevent ID Theft While Traveling
ID theft is a major concern for many people, especially since hackers have become very skilled at getting into personal emails and bank accounts. The travel industry is also no stranger to scammers but there are ways to protect yourself from falling victim. Read on to...