Archive

Archive

6 Things to Watch Out for in Phishing Attacks

While phishing attacks may be one of the oldest forms of attacks, they have shown no signs of slowing down. The growth of phishing attacks in both frequency and sophistication poses a significant threat to organizations of all size. It’s ... »

The Dangerous Journey of a Fake WhatsApp App on OneDrive

Partner Symantec, recently discovered a new kind of malicious Android file hosted on a OneDrive account. Here’s what they have learned and how you can take countermeasures. Over the last few years, there has been a tremendous uptick in the ... »

Why Cyber Security is the New Health and Safety

Many people view the Health and Safety at Work Act 1974 as unnecessary and burdensome, but its introduction has had a dramatic impact on reducing accidents in the workplace, particularly within industrial settings. This blog was originally posted by our ... »

Solving the Industrial IoT Challenge: How Manufacturing Companies Can Keep Devices Secure

Whether manufacturing organizations are retrofitting IoT devices into existing manufacturing equipment or buying new equipment that already includes IoT devices and sensors, it is clear that IoT devices are poised to dramatically improve manufacturing efficiency. The “IoT in manufacturing” market ... »