Basic-cyber-threats-explained
Blog, Infographics, Uncategorized

Basic cyber threats explained

Businesses, in particular small to medium ones, often do not consider that they could be targeted by cybercrime. Unfortunately, the reality is that many small to medium businesses are now very much being targeted by cyber-criminals. The vast majority of criminals are opportunists, meaning that they will look to take advantage of any businesses that are […]

0 Shares
Simple Cyber Security threats every small business owner should know about
Blog, Fact Sheets, Uncategorized

Simple cyber security threats every small business owner should know about

Cyber security is a wide-ranging term that can relate to a plethora of complicated issues that are far above the head of the average person. However, small businesses can take strides towards making themselves more secure by taking simple steps to secure their information by avoiding negligent security habits.   These small practices begin with […]

0 Shares
NIS directive & GDPR: Regulations that will have a global impact
Blog, Uncategorized

NIS directive & GDPR: Regulations that will have a global impact

By Natasja Bolton, Senior Acquirer Support QSA With the increase of malware and other malicious cyber security attacks that have had a global impact in the last few years, governments around the world have been trying to implement concrete safeguards through regulation. The goal of these regulations being to not only protect valuable infrastructure services […]

0 Shares
Ransomware – Steps that organisations and businesses need to take
Blog, Cyber Risk, Uncategorized

Ransomware – Steps that organisations and businesses need to take

The recent global ransomware attack, referred to as ‘WannaCry’, that resulted in over 45,000 attacks and infected major companies, hospitals and other government institutions, unfortunately caught many off guard.   WannaCry targeted computers running Windows operating systems that had not been updated with a security update released by Microsoft in March 2017, as well as […]

0 Shares
Ransomware - Tips on prevention, response and evading extortion
Articles, Blog

Ransomware – Tips on prevention, response and evading extortion

by Dr. Grigorios Fragkos, VP Cybersecurity Ransomware, a malware that prevents or in some cases limits users from accessing their data has been on the rise. Last year, 2015 saw a considerable increase with Crowti (also known as CryptoWall) and FakeBSOD being the two instances that affected more than 850,000 systems between June and November. […]

0 Shares
Blog, Client Resources

Malware POS Alert – AbaddonPOS and Cherry Picker

by Dr. Grigorios Fragkos, VP Cybersecurity Two new malware files have been identified targeting point-of-sale (POS) terminals called AbaddonPOS and Cherry Picker. The AbaddoPOS malware is delivered by the Angler Exploit Kit or through an infected Microsoft Office document. The malware targets the memory of all processes running on the infected system (excluding its own […]

0 Shares