22% of Brits Received Proof of Vaccination Phishing Email in Past Six Months

22% of Brits Received Proof of Vaccination Phishing Email in Past Six Months

Nearly a quarter (22%) of Brits have received phishing emails asking them to download their ‘proof of vaccination’ in the past six months, according to new research by Tessian. The analysis found that most of these scam messages received in the UK impersonated the National Health Service (NHS), the public body that manages official vaccination pass documentation in the country. The researchers noted many of these phishing messages look genuine, containing official logos, using accurate…

Read More

What to do if your small business is a victim of a cyberattack

What to do if your small business is a victim of a cyberattack

Immersed in the throes of a cyberattack is not the time to figure out how to respond. An expert offers suggestions on how to create a company-specific incident-response plan. Image: iStockphoto/ipopba Your small business is doing OK. You hope this year’s Christmas season will be a blockbuster. Last year, COVID nearly destroyed the business. This year should be different: Forecasts look good.  It’s late at night, why would my partner be calling me now? “What’s…

Read More

Train to qualify for elite positions in the high-demand field of cybersecurity

Train to qualify for elite positions in the high-demand field of cybersecurity

You don’t have to go back to school or blow your budget to train for a career in cybersecurity, which is in high demand right now. Image: Jaiz Anuar/Shutterstock Want an exciting new career in the new year? Even with no experience whatsoever, you can learn the skills necessary to enter and advance in the cybersecurity industry with The A to Z Cyber Security & IT Certification Training Bundle. Total novices may want to start…

Read More

How IT pros can set boundaries and protocols

How IT pros can set boundaries and protocols

From managing backups and Linux distributions to troubleshooting hard drive failure and protecting company data, it’s easy to see why IT pros are overwhelmed and overworked. Image: SARINYAPINNGAM, Getty Images/iStockphoto IT teams have to be ready for anything when it comes to protecting company data. Hackers are always coming up with new ways to infiltrate systems, encrypt backups and demand a ransom. There are also user problems to deal with on a daily basis, and…

Read More

Halloween Horror-Show for Candy-Maker Hit by Ransomware

Halloween Horror-Show for Candy-Maker Hit by Ransomware

A major US confectionary manufacturer has been hit by ransomware at one of its busiest times of the year, according to reports. Chicago-based Ferrara – which produces popular treats including Nerds, Everlasting Gobstoppers, Juicy Fruits and Gummy Bears – had some of its systems encrypted earlier this month. It’s now working with law enforcement and third-party experts to restore these critical assets and get operations fully up and running again. “We have resumed production in select manufacturing…

Read More

Over 80% of Brits Deluged with Scam Calls and Texts

Over 80% of Brits Deluged with Scam Calls and Texts

Some 45 million Brits received fraudulent phone calls and texts over the summer, according to new data from Ofcom. The UK’s telecoms regulator polled 2,000 adults on September 18-19 2021, to assess how many had been affected in the previous three months. Some 82% said they had, with the vast majority (71%) claiming they’d received suspicious text messages. Three-quarters (75%) of those people were aged 16-34. Over two-fifths (44%) of those who’d received messages said they…

Read More

Government Agents Compromise REvil Backups to Force Group Offline

Government Agents Compromise REvil Backups to Force Group Offline

The US authorities appear to have scored another win in their fight against ransomware by forcing the infamous REvil group offline. Experts have warned that there could be repercussions for former breach victims. One former official and three private-sector cybersecurity experts confirmed to Reuters that an international operation was responsible for taking the group’s data leak site “Happy Blog” offline a few days ago. Government specialists managed to compromise some of the group’s backups so that when…

Read More

Migrating video surveillance to the cloud can improve overall security

Migrating video surveillance to the cloud can improve overall security

Migrating video surveillance to the cloud can improve overall security This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

The five W’s of third-party incident management

The five W’s of third-party incident management

The five W’s of third-party incident management This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this…

Read More

Conquering security challenges in the hybrid workplace environment: The BYOD variant

Conquering security challenges in the hybrid workplace environment: The BYOD variant

Conquering security challenges in the hybrid workplace environment: The BYOD variant This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More
1 3,411 3,412 3,413 3,414 3,415 3,968