Software Contract Solutions

Facts about backup security that should scare you to death

How to tighten up security for backup systems and avoid malicious activities carried out by lone wolves. Least privilege—the idea that each person in your organization should have the least number of privileges they need in order to accomplish a given task—is an important security concept that needs to be implemented in your backup system. … Read more

Odds are we’ll all soon move to Desktop-as-a-Service

With the coronavirus pandemic forcing more people to work from home, it’s becoming clear, we’re doing a lousy job of protecting our PCs. The only real answer: Desktop-as-a-Service (DaaS). I know how to secure my PCs. I’ve never fallen victim to a phishing attack; gotten infected by a worm; been maligned by malware. But then … Read more

Small business guide: How to keep your organisation secure from fraudsters and hackers

Doing a few things well can keep your organisation protected from common cyber attacks and fraudsters. In the time it takes you to read this sentence, three attempts to hack UK businesses will have taken place. By the time you finish this article, 15 businesses will have had their security successfully breached. Your business has … Read more

Almost all cyberattacks in 2018 were preventable

New research shows cyber-security incidents that exposed 5 billion records cost an estimated $45 billion last year. In 2018, over 2 million cyber incidents racked up a minimum of $45 billion in losses, according to a recently released report based on statistics gathered from organizations that track data breaches. Jeff Wilbur, technical director of the … Read more

Cyber attackers exploiting poor cloud security

More than a third of organizations report a cyber attack on the cloud environment due to a lack of basic cloud security hygiene. Despite 42% of organisations saying they are concerned about cloud security, many are failing to carry out security testing or follow best practices, a study shows. The potentially devastating effects of poor … Read more

Cyber attackers favoring stealthier attacks, says Darktrace

Cyber attackers are moving away from ransomware to stealthier tactics, including banking Trojans and cryptojacking, an analysis of attack data reveals. Cyber criminals are switching away from ransomware to stealthier attacks as the main sources of generating revenue, according to analysis by British artificial intelligence (AI)-based cyber security firm Darktrace. The firm’s latest cyber threat landscape report is based on … Read more

Supply chain attacks are the next big risk for organisations

According to CrowdStrike’s new report, two-thirds of respondents have suffered a supply chain attack within the last year. While enterprise leaders scramble to fend off ever-evolving cyber threats, a new report from CrowdStrike shows why business leaders need to be more precious about their supply chain. According to the report, 90% of respondents admitted to incurring … Read more

Cyber attackers can breach targets in hours, report reveals

The majority of hackers claim they can breach an organisation within hours, while most security professionals admit they do not know what to look for. The majority of cyber attackers (71%) can breach a targeted organisation within 10 hours, and 18% claim they could breach a target in the hospitality and food and beverage industries … Read more