How your Company can Recognize and Combat Cyber Crime
Blog

How your Company can Recognize and Combat Cyber Crime

This is one of the most talked about topics in the media and in boardrooms in recent years. It is a major problem and challenge for many organizations. The average dwell-time (average time before a company detects a cyber breach) is more than 200 days, highlighting this as an area where companies do not do…

Protecting your Business from Cyber extortion
COMPUTER SECURITY

Protecting your Business from Cyber extortion

In the shadowy world of security threats and bad actors, cyber extortion is a growing trend. Cyber criminals are taking advantage of the vulnerability of intellectual property, threatening to release potentially embarrassing information publicly and encrypting data to render it useless to the rightful owners, among other sinister practices. Unlike the risks associated with more…

How safe are you from email hijacking?
COMPUTER SECURITY

How safe are you from email hijacking?

Once you possess an iPad, Debit/Visa card and use mobile banking, you are engaged in plenty of online transactions. Yes you’re trendy but are you secure? With the dawn of cloud services, the most intimate details of our lives are contained on remote servers in a single account. It is a good thing to store…