aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
8/31/2017 12:46:46 PM
Contributor:
Andrew Avanessian

CeX sees 2 million customer details compromised

CeX, the second-hand electronics, and video games retailer has reportedly had the details of two million customers compromised by hackers. The information stolen included names, addresses, email addresses and some phone numbers, as well as a small number of encrypted credit card details.

Continue reading
Date published
3/9/2017 10:00:46 AM
Contributor:
James Maude

WikiLeaks’ CIA documents offer us an important reminder

With news breaking on the CIA’s ability to listen in via Smart TVs, many will be alarmed by the breadth of the exploits WikiLeaks has uncovered. The security industry has been warning of the dangers of Internet of Things devices for a long time and just last week, a hack on internet-connected teddy bears was making the headlines.

Continue reading
Date published
9/23/2016 11:29:30 AM
Contributor:
James Maude

Yahoo what?

Following the Yahoo breach many users are concerned about their online safety and what to do next. As with all data breaches although a lot of the issues are beyond the control of the user there are some straightforward measures that they can take to be as safe as possible online.

Continue reading
Date published
12/17/2015 3:13:58 PM
Contributor:
Andrew Avanessian

2016 predictions: Securely does it

2015 has often been referred to as the year of the breach, with high profile attacks affecting global organizations in huge numbers. It was the year data breaches got personal with high profile attacks compromising almost every aspect of user’s lives.

Continue reading
Date published
12/11/2015 11:28:03 AM
Contributor:
Dan Raywood

Responding to a breach: The importance of clear communication

The correct method of dealing with a data breach contains many actions including containment, employee engagement and making sure it never happens again, but part of your plan should include planning how to get your message out there and let your investors and customers know what the latest status is.

Continue reading
Date published
7/13/2015 12:45:50 PM
Contributor:
James Maude

Hacking Team - Zero Day Any Day

In InfoSec these past few weeks it has been impossible to miss the news that the secretive spyware company known as Hacking Team has been breached and their files posted online. This compromise has resulted in 400GB of confidential data being released online and caused widespread embarrassment for the company and clients alike.

Continue reading
  1. 1
  2. 2