The Real Dangers of Remote Working
Remote working. It's great, right? No commute, more time in bed and you can sit in your pyjamas all day. At least that's been the…
Healthcare & Hospitals Hammered by Hackers in UVM cyberattack
It truly seems there's no limit to how low hackers will sink. Whether the healthcare industry is just an easy target right now due to…
Why the Marriott data breach was completely avoidable
Whilst the new merger where your business acquired a valuable asset might seem like a successful move, be careful, sometimes stray hackers tag along. Like…
Psychiatric Patients fall victim to cyber attack in Finland
Distancing yourself from the internet to avoid hackers may feel akin to sitting in the middle of the island, well away from hungry sharks circling…
How hackers are evolving and what this means for our businesses
Using DDoS attacks to enforce a ransom Hackers are now using the threats of DDoS attacks to extort businesses. A typical ransomware attack involves hackers…
5 Cyber tricks businesses continue to fall for
As you may have seen, we ran a webinar with Ian Murphy, CEO at CyberOff. I had the pleasure of hosting, so I was really…
A Brief History of Cyber Threats - By Westpoint
Gather round one and all, for our retelling of the timeline of cyber threats throughout history. Back in 1988, an American computer scientist by the…
Why are healthcare services targeted by cyber attacks
Healthcare is consistently the most targeted industry by hackers and cyber attacks. In 2019, data breaches and ransomware attacks cost the industry an estimated $4…
The cost of hiding a cyberattack - Dunkin' Donuts settles lawsuit
When your business is hit by a cyberattack and your customer's data is compromised, the potential damage to your reputation is cause for worry. Announcing…
TikTok: A history of cybersecurity vunerabilities and flaws
Concern over the popular social media app TikTok grows as more vulnerabilities are revealed. Four high severity flaws have been disclosed by researchers within the…
7 types of Man in the Middle (MITM) attacks hackers are using
6 in 10 businesses will declare bankruptcy as soon as 6 months after a cyber attack. Man in the Middle attacks or MITM for short…
New Zealand Stock Exchange suffers cyberattacks for over a week
DDoS attacks are on the rise. In Q1 2020, there were nearly twice as many reported DDoS attacks than Q1 2019. The primary targets of…
Page 1 of 2


We use cookies to provide you with the best possible browsing experience on our website. You can find out more below.
Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.
ResolutionUsed to ensure the correct version of the site is displayed to your device.
SessionUsed to track your user session on our website.
Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.
Google AnalyticsGoogle Analytics is an analytics tool to measure website, app, digital and offline data to gain user insights.

More Details