News

[et_pb_section fb_built="1" _builder_version="3.22.3"][et_pb_row _builder_version="3.25" custom_margin="|auto|-353px|auto||" custom_padding="0px|||||"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="3.27.4" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" custom_padding_tablet="" custom_padding_phone="" custom_padding_last_edited="on|desktop"] The green padlock icon has been associated with security for quite some time. Although Google has abandoned it for its Chrome browser, the icon continues to be considered as an...

[et_pb_section fb_built="1" _builder_version="3.22.3"][et_pb_row _builder_version="3.25" custom_margin="|auto|-353px|auto||" custom_padding="0px|||||"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="3.27.4" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" custom_padding_tablet="" custom_padding_phone="" custom_padding_last_edited="on|desktop"]A mysterious new phishing campaign is targeting government departments and related business services around the world in cyberattacks that aim to steal the login credentials from victims. In total, the phishing attacks have targeted...

[et_pb_section fb_built="1" _builder_version="3.22.3"][et_pb_row _builder_version="3.25" custom_margin="|auto|-353px|auto||" custom_padding="0px|||||"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="3.27.4" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" custom_padding_tablet="" custom_padding_phone="" custom_padding_last_edited="on|desktop"] Amazon Web Services (AWS) worldwide public sector vice president Teresa Carlson believes the best place for governments to run their business securely is in the cloud. Speaking at the AWS...

[et_pb_section fb_built="1" _builder_version="3.22.3"][et_pb_row _builder_version="3.25" custom_margin="|auto|-353px|auto||" custom_padding="0px|||||"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="3.27.4" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" min_height="1461px" custom_padding="||0px|||" custom_padding_tablet="" custom_padding_phone="" custom_padding_last_edited="on|desktop"]FireEye issues guidance on locking down Outlook, claiming that security researchers, at least, are able to work around the patch issued by Microsoft. A 2-year-old vulnerability in Microsoft...

[et_pb_section fb_built="1" _builder_version="3.22.3"][et_pb_row _builder_version="3.25" custom_margin="|auto|-353px|auto||" custom_padding="0px|||||"][et_pb_column type="4_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_text _builder_version="3.27.4" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" custom_padding_tablet="" custom_padding_phone="" custom_padding_last_edited="on|desktop"]The Microsoft threat research team scanned all Microsoft user accounts and found that 44 million users were employing usernames and passwords that leaked online following security breaches at other...

[et_pb_section fb_built="1" _builder_version="3.22.3"][et_pb_row custom_padding="0px|||||" _builder_version="3.22.3"][et_pb_column type="4_4" _builder_version="3.0.47"][et_pb_text _builder_version="3.0.106" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" custom_padding_last_edited="on|desktop"]Communicate & Collaborate externally, effortlessly Microsoft Teams, a cloud-based platform offering a flexible space for collaboration across a substantial number of unique devices, providing a more central approach to communication. With Teams, you can share, communicate...

[et_pb_section fb_built="1" _builder_version="3.22.3"][et_pb_row custom_padding="0px|||||" _builder_version="3.22.3"][et_pb_column type="4_4" _builder_version="3.0.47"][et_pb_text _builder_version="3.0.106" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" custom_padding_last_edited="on|desktop"]Combine your day to day operations within one application With a range of tools available to us on our computers these days, it’s difficult to work out what’s the best to use. Few apps are...

[et_pb_section fb_built="1" _builder_version="3.22.3"][et_pb_row custom_padding="0px|||||" _builder_version="3.22.3"][et_pb_column type="4_4" _builder_version="3.0.47"][et_pb_text _builder_version="3.0.106" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" custom_padding_last_edited="on|desktop"]Perplexed by all the choices in Office 365? Skype, Teams, SharePoint… Cloud platforms are advancing and so has the range of features and tools available to users within them. As much as they may make...

[et_pb_section fb_built="1" _builder_version="3.22.3"][et_pb_row custom_padding="0px|||||" _builder_version="3.22.3"][et_pb_column type="4_4" _builder_version="3.0.47"][et_pb_text _builder_version="3.0.106" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" custom_padding_last_edited="on|desktop"] Back in 2018 data breaches cost UK organisations an average of £6.4 million.Human error, meanwhile, accounted from anywhere between 60% and 90% of them.Those facts alone are usually enough to convince people security awareness training is...

[et_pb_section fb_built="1" _builder_version="3.22.3"][et_pb_row custom_padding="0px|||||" _builder_version="3.22.3"][et_pb_column type="4_4" _builder_version="3.0.47"][et_pb_text _builder_version="3.0.106" header_2_font="|600|||||||" header_2_text_color="#0c71c3" header_2_font_size="20px" custom_padding_last_edited="on|desktop"]P 37% of cyber attacks are discovered directly on servers, making them the most likely place to identify an attack within an organisation. That’s one of the alarming stats taken from a recent survey of 2,700...