Stock up on sprouts, hang the decorations and prepare for a barrage of cyber attacks, because the Christmas season is in full swing. December is a busy time for cyber criminals, as they look to take advantage of understaffed IT …
Want to stay up to date on phishing scams? Our ‘catches of the month’ feature reviews the most prominent attacks across the web, explaining how they occurred and the steps you should take to stay safe. This month, we bring …
If you’re planning to implement an ISMS (information security management system), you’ll need to document the scope of your project – or, in other words, define what information needs to be protected. There will almost certainly be more information and …
It was a big month for data breaches, with a confirmed 1,341,147,383 records being exposed in 87 incidents. However, almost all of those came from one leaked database, the origin of which is unclear. Here is a full list of …
Black Friday has fast become a staple of our high street and online shopping experience, even though it has its roots in US traditions. But the day isn’t all fun and bargains. Besides the traumatic experience for some retail employees …
T-Mobile has confirmed that its systems have been hacked, with cyber criminals stealing the personal data of more than one million US customers. According to the organisation, customer names, addresses, phone numbers, rate plans and plan features were all exposed. …
UK organisations are overlooking the importance of cyber security staff awareness training, instead investing in expensive and unnecessary technologies, a VMware and Forbes Insight study has found. The research revealed that 78% of UK businesses are using substandard cyber security …
As part of your ISO 27001 certification project, your organisation will need to prove its compliance with appropriate documentation. ISO 27001 says that you must document your information security risk assessment process. Key elements of the ISO 27001 risk assessment …
Cyber security awareness training is one of the most important steps an organisation can take to protect its systems. Sure, you need anti-malware tech and firewalls to prevent cyber attacks, and you definitely need to back up sensitive files in …
It’s easy to find advice online about how to spot phishing scams, but do you know how they work in the real world? Our ‘catches of the month’ feature provides examples of recent phishing scams, showing you the latest tactics …