Employees 70% of UK businesses implement multi-factor authentication to secure remote workers during Covid-19 crisis

Over two thirds (70 per cent) of British businesses are using multi-factor authentication (MFA) and a virtual private network (VPN) …

Vulnerability Exploits, vulnerabilities and threat adaptation during the COVID-19 pandemic

Vulnerabilities and exploits are critical in all security domains, but especially now, during the COVID-19 pandemic, where malicious actors are …

Employees Half of employees watch inappropriate content on the same devices they use for working...

As social distancing measures become common and workers adjust to their new professional environments, even from their own living rooms, …

IoT More than two-thirds of security professionals lack confidence that they can prevent a wireless...

Despite widespread knowledge about the vulnerabilities Wi-Fi and Bluetooth can introduce, it appears a ‘head in the sand’ approach continues …

Cyber security Vulnerability Management simplified: The benefits of Contextual Network Visibility

One of the common characteristics that binds breached organisations is the lack of full network visibility. While most organisations will …

Privacy Zoom security: I’ve researched problems with video conferencing for years – here’s what you...

The video conferencing app Zoom gained about 2 million new users in the first two months of 2020 – and …

GDPR Is excessive data making your business dangerously overweight?

Are you feeling gluttonous? Bloated? Overweight? We’re not talking about your diet in the Coronavirus shutdown period, but the data …

Vulnerability How to keep your footing on Vulnerability Management mountain 

In the second of this Vulnerability Management series from Lamar Bailey, senior director of security research at Tripwire, he outlines the …

Ransomware A how-to guide for overcoming ransomware attacks

Within the span of merely six years, Cybersecurity Ventures estimates that the global damage costs of ransomware will increase 61 …

Ransomware Deal with ransomware the way police deal with hostage situations

When faced with a ransomware attack, a person or company or government agency finds its digital data encrypted by an unknown person, …

Data privacy Mobile phone data is useful in coronavirus battle. But are people protected enough?

Tracking people infected with COVID-19 has become an important weapon in global responses to combatting the virus. Through the use …

Vulnerability Starting your journey up Vulnerability Management mountain  

How to best tackle Vulnerability Management (VM)? Here is the first in a series from Lamar Bailey, senior director of …