How SMEs can set their defences against today’s cyber threats

What is the most dangerous trait of a cyberattack? Some use complex social manipulation to spear phish individuals. Others deploy weaponised artificial intelligence (AI) and sophisticated malware programmes to gain access and create chaos. By Hans-Peter Bauer, senior...

Are you covered for Email interception fraud?

Email interception fraud is on the rise and takes the form of criminals stealing information such as email usernames and passwords. It enables the fraudster to gain access to your business email accounts allowing them to impersonate you and the business. It provides...

Insurance companies weather the storm with threat alerts

Customers only engage with insurance companies during the claims process when something has been damaged – whether a home, a vehicle, or a business. And that’s where weather intelligence can improve and enhance the customer experience, while saving...

Never do these things on your company computer

At least 70% of employees admit to doing activities that are not work-related on their company computer. Although some employers may ignore your browsing habits, it is important to reconsider your activities on your work PC or laptop, particularly in light of...

What is data encryption?

Keeping information from unauthorised eyes is a practice as old as recording information. Regents would add their seal into wax to stop snoops from reading orders. Warring nations spend great expense and effort to break the codes of their opponents. And in the modern...