Tag: cybersecurity

Coding

5 Tips for Picking Your Endpoint Security Software

As a business, it is crucial to implement a structured approach to endpoint security in this current cybersecurity landscape.  With the number of successful cyber...
Cybersecurity

Get Better at Cybersecurity By Thinking Like a Writer

As more of our daily activities are taking place online, there can be hidden dangers to our online presence. It doesn’t matter if your...

How IoT and AI will impact the future of cybersecurity?

The hype about both Artificial Intelligence (AI) and Internet of Things (IoT) have reached the zenith of popularity. Both of these terms came into...
Managed Detection and Response

Common Questions and Answers about Managed Detection and Response

In the modern world, so much business is done online. Across almost every industry, it's vital for companies to have digital infrastructure and networks...
tech devices

Can Predictive Analytics Be Used in IT Security?

Executives and managers are becoming more and more reliant on data in order to run their businesses. From understanding consumer behavior to forecasting sales...

Hacking Christmas: Cyber Criminals Leverage The Spike In Online Sales 

Expert identifies 4 cornerstones of retailer’s cyber security PwC’s 2020 US Holiday Outlook indicates that 61% of those surveyed will do most of their shopping...
playing with phone

Are You Buying Your Child an iPhone Over the Holidays?

Do you remember back in the day when cellphones were the size of small toasters, and only a select few people had them? Those times...
Cybersecurity

Is Your Company In Digital Danger? Common Cybersecurity Risks That Are...

In business, your reputation is everything. It takes years to build and generate, yet it can all come crashing down with just a few...

Fifteen Things That Make Your Phone An Easy Target For Hackers

Many people tend to ignore the fact that their mobile phones are also an easy target for cyber attacks. We depend on our phones...

Cybersecurity 101 – Cybercrime – Dark Web – Hacking

https://youtu.be/nFeMJuNjg2c Cybercrime in the Dark Web, Global cybercrime costs will exceed $6 Trillion in the next years. From virtual bank heists to semi-open attacks from...

Cipherpoint Solution for PCI DSS Compliance in Australia

At the advent of technology, where online transactions are flourishing, there should be security measures to ensure that the private information of individuals is...

Do Password Managers Actually Help Protect Company Data?

Protecting company data is a priority for businesses both large and small. Sometimes, specific company data is only protected by a password, making passwords...

Sectors Vulnerable to Cyberattacks in 2020

The modern era is one characterised by a degree of computerisation which, just a few decades ago, would have seemed completely ridiculous. It’s prompted...

Protect Your Privacy from Cybercriminals with these 5 Apps

Every time you go online, all your activities are exposed to online merchants, subject to misuse by advertisers, or losing your privacy policy through...

Covid-19 Exposes UK’s Cyber Security Vulnerabilities – With Over 65,000 Attacks...

UK SME’s are at risk of 65,000 cyber security attacks daily – with around 4,500 of these being successful – and the figure could...

Organisations report a decrease in data loss caused by cyber-attacks for...

New research from Databarracks reveals organisations are benefiting from increased investment in IT security and cyber testing New research from Databarracks has revealed that, for the...

Don’t Default on Password Security

Password security has been a hot topic for some time now. In fact, the discussion surrounding password complexity, single sign on, protecting accounts with...

Twitter Hacked: Experts Warn Businesses To Take Action Amid Cyber Security...

In a series of tweets posted on Twitter’s support account, the company revealed that hackers compromised its internal systems. Twitter admitted that the attack...

Colm Murphy, Cyber Security Advisor At Huawei On 5G, Cyber Security...

Colm Murphy, Cyber Security Advisor at Huawei is the new guest in this new interview series. Hosted by Dinis Guarda, both technology specialists discuss...

Exploiting Fear in a Cyber World

It is both incredible and disturbing what we are capable of when the lives, health, or security of ourselves and loved ones are threatened....

Data Privacy And Coronavirus Pandemic: Are Businesses Prepared For The ‘Return...

Why putting measures in place to keep data safe as employees rejoin their company’s network, should be a number one top priority. By Stephen Burke,...

Sandra Tobler, CEO and Founder Futurae On Cybersecurity and Fintech

Dinis Guarda interviews Sandra Tobler, IT specialist and co-founder of Futurae about the challenges of cybersecurity in Fintech as well as the solutions. Sandra Tobler...

Dinis Guarda Interviews Jorge Sebastiao, Technology Thought Leader And Influencer

Jorge Sebastiao is a technology thought leader, influencer and ICT expert in the area of cyber security with more than 35 years of experience...

When You Know It’s Time to Implement an MFT Strategy

As organizations are relying heavily on the exchange of digital files to conduct business, there’s a growing concern about the security of various file...

MOST POPULAR