aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
8/31/2017 12:46:46 PM
Contributor:
Andrew Avanessian

CeX sees 2 million customer details compromised

CeX, the second-hand electronics, and video games retailer has reportedly had the details of two million customers compromised by hackers. The information stolen included names, addresses, email addresses and some phone numbers, as well as a small number of encrypted credit card details.

Continue reading
Date published
5/25/2017 7:27:04 AM
Contributor:
Ian Pitfield

GDPR – A threat and an opportunity

With just a year to go until GDPR takes effect, there are concerns that around half of businesses may not meet the new data protection standards in time. While the majority of IT security professionals are aware of GDPR, a recent poll found just under half are preparing for its arrival.

Continue reading
Date published
3/9/2017 10:00:46 AM
Contributor:
James Maude

WikiLeaks’ CIA documents offer us an important reminder

With news breaking on the CIA’s ability to listen in via Smart TVs, many will be alarmed by the breadth of the exploits WikiLeaks has uncovered. The security industry has been warning of the dangers of Internet of Things devices for a long time and just last week, a hack on internet-connected teddy bears was making the headlines.

Continue reading
Date published
11/8/2016 1:14:03 PM
Contributor:
James Maude

Is social engineering the new norm?

Throughout history humans have sought to socially engineer each other, exploiting social norms and applying pressure to reveal information or gain advantage. From travelling conmen and master spies to cyber threats and phishing emails the fundamental problem is the same, humans can be manipulated.

Continue reading
Date published
9/23/2016 11:29:30 AM
Contributor:
James Maude

Yahoo what?

Following the Yahoo breach many users are concerned about their online safety and what to do next. As with all data breaches although a lot of the issues are beyond the control of the user there are some straightforward measures that they can take to be as safe as possible online.

Continue reading
Date published
12/11/2015 11:28:03 AM
Contributor:
Dan Raywood

Responding to a breach: The importance of clear communication

The correct method of dealing with a data breach contains many actions including containment, employee engagement and making sure it never happens again, but part of your plan should include planning how to get your message out there and let your investors and customers know what the latest status is.

Continue reading
  1. 1
  2. 2