Sep 27, 2017
Insider threats are one of the trickiest threats to detect and fight effectively, and are a top concern for businesses of all types, particularly those that house sensitive customer data. Insider threats are even more dangerous, because unlike hackers, they...
Sep 20, 2017
It has become more common these days to hear about the latest security breach or denial of service (DOS) attack, which highlights the many challenges businesses face as they look to curb an increasing number of attacks passing through their IT networks. In the telecom...
Sep 18, 2017
When it comes to mobile devices, things are getting more personal, including attacks. Contact lists, emails and text messages are just the tip of what people keep on their devices. With banking applications, location histories, social media, photographs, enterprise...
Sep 14, 2017
Cyber-crime is on the rise, and given the growing use of technology and the growing volumes of data organisations and individual users face, it is no surprise. By Paul Evans, MD of Redstor Recently, British Airways was struck by an outage that left not one but two...
Sep 13, 2017
A study released in December 2016 estimated it takes around six seconds to hack a credit or debit card. That means working out the card number, expiry date and security code of any debit or credit in the same time it takes to click ‘complete purchase’. The...
Sep 12, 2017
As data breaches become more commonplace, littering the headlines on a daily basis, businesses of all types and across all industries need to work on the assumption that they are a target. Because of this, organisations, especially those who house sensitive, valuable...