Small Business

17 essential security steps for SMBs shared by 21 global experts

Essential Security for SMB shared by Global Experts We have spoken with over 50 experts in the fields of IT Security, Law, Insurance, Business continuity as well as directly with some small businesses themselves to bring you the top 21’s advice and insights. This advice shows a number of key themes that align with expert …

17 essential security steps for SMBs shared by 21 global experts Read More »

3 ways that Cybercriminals are Collaborating

We are seeing our customers experience malware (Malicious software like Ransomware or Banking Trojans) that is continuing to bypass their antivirus software (see why in our blog on “Why antivirus fails“). One of the reasons is that criminals are very open to sharing the techniques and tools they use to get past traditional security controls such as antivirus …

3 ways that Cybercriminals are Collaborating Read More »

Facebook Databreach, how Cambridge Analytica abused Facebook’s API

The ongoing controversy of the US election and the proliferation of fake news on platforms such as Facebook continues. Now we are discovering a Cyber Security and privacy slant, where a UK company, who specialise in changing audience behaviour has been found to be abusing Facebook’s API. This resulted in Cambridge Analytica gaining access to 50 million user …

Facebook Databreach, how Cambridge Analytica abused Facebook’s API Read More »

Online ads vs getting hacked

There is an ongoing challenge for online businesses who depend on website ads for revenue with users being told to protect themselves from malicious websites through using Adblockers. Remote scripts have become a valuable tool for delivering ads to websites because of their flexibility and ability to dynamically change depending on the ad campaign. Unfortunately, they are …

Online ads vs getting hacked Read More »

0 day vulnerability in SAML could lead to your SSO being hacked

A new SAML vulnerability could allow Cybercriminals to hack organisations Single-Sign-On to access private data. A flaw in the SAML protocol which is used by all SSO implementations from cloud providers and internal applications was discovered by Duo Security and the US-CERT. It allows an attacker to access users accounts without the need of their password thus not requiring a phishing …

0 day vulnerability in SAML could lead to your SSO being hacked Read More »