Endpoint Security
Endpoint Security
 Mar 19, 2019

We examine some of the practices required to keep your endpoints secure, no matter whether they are based on NextGen technologies or traditional AV solutions....

More...
Microsoft Patch Tuesday - March 2019
Microsoft Patch Tuesday - March 2019
 Mar 19, 2019

This month Microsoft has patched 64 vulnerabilities, 17 of which are rated Critical and cover 14 different windows components or applications....

More...
Microsoft Patch Tuesday February 2019
Microsoft Patch Tuesday February 2019
 Feb 23, 2019

This month Microsoft has patched 74 vulnerabilities, 30 of which are rated critical and cover a wide range of features and technologies...

More...
How to Recover from a Phishing Attack – Part 2
How to Recover from a Phishing Attack – Part 2
 Feb 18, 2019

Part 1 examined the initial steps a business would take to recover from a phishing attack. In Part 2 we examine the remediation and risk avoidance steps....

More...
How to Recover from a Phishing Attack – Part 1
How to Recover from a Phishing Attack – Part 1
 Jan 29, 2019

In this blog, we examine the steps that you need to take for your organization to recover from a Phishing Attack....

More...
Spear Phishing Attacks - Part 1
Spear Phishing Attacks - Part 1
 Dec 08, 2018

This year we have seen increasing examples of spearphishing, especially with O365 installations where attackers are targeting significant numbers of people inside or...

More...
How to Avoid A Data Security Breach
How to Avoid A Data Security Breach
 Dec 04, 2018

In the past few years, attacks against the digital supply chain have increased. The weak link in enterprise security might very well lie with these partners, suppli...

More...
The Security Threats Posed to Mobile Apps That You Must Know
The Security Threats Posed to Mobile Apps That You Must Know
 Dec 04, 2018

In this blog, we talk about the security compromises that can impact financial transactions on mobile devices as well as the role of Mobile Payment Providers. ...

More...
Cryptojacking 101
Cryptojacking 101
 Dec 04, 2018

In the past year, attackers have moved from the once popular Ransomware attacks to CryptoJacking or CryptoMining, which has exploded in prevalence in 2018. This att...

More...
Phishing Attacks
Phishing Attacks
 Dec 04, 2018

According to Phishlabs 2018 Security Report, 71% of all targeted attacks started with spear phishing to infect their victims. This blog is targeted at end users. It ...

More...