Following the global pandemic, the mass migration to remote working was a necessary move. As things have begun to return to the ‘new normal,’ however, we noticed that many sectors are planning to stick with remote and hybrid models of working and are therefore continuing to rely on the use of mobiles and tablets to routinely access corporate data. However, since iOS, Android and Chrome OS devices host a treasure trove of data, there’s an urgent need for these devices to be secured from the growing cyber threat.
The report from the ICO on the ‘surprising’ decline in personal data breaches has certainly opened up a topic of debate, which clearly leads us to think: is our cyber training and education really working?
On 10th August 2021, Poly Network announced in a tweet that it had been attacked. Not only had their network been breached, but the hacker had transferred enormous sums to their addresses right under Poly Network’s nose.
Recently, an infamous threat actor group going by the name of TG1021 or Praying Mantis, has been caught targeting Microsoft IIS servers by exploiting vulnerabilities. In this blog, we’re taking a look at Sygnia’s Incident Response Team’s report on the current events regarding the threat actors activities, how they do it and more importantly, how you can protect yourself.
The ISDN switch-off is much sooner than you think, yet as many as 2 million customers still rely on ISDN as their primary connectivity solution. As we power through the five-year switch-off plan, we’ve put together a guide to what you need to consider when choosing and implementing your ISDN alternative.
Ransomware is difficult to protect against as the criminals themselves are security experts who carefully review and target their victims. Attackers are becoming increasingly skilled at exploiting vulnerable services and unpatched software, with almost three-quarters of Ransomware attacks managing to successfully encrypt private company data. According to a 2020 survey by Sophos, 51% of organisations were hit by Ransomware in the last year. The criminals succeeded in encrypting the data in 73% of these attacks.
Most Ransomware breaches require some type of end-user interaction, whether that’s opening a malicious email attachment or clicking on a link. At FluidOne, we understand that it is easy to fall victim to an attack when users don't know to be vigilant. To avoid becoming another statistic, we have teamed up with our security expert partner, Cyber Security Associates, to bring you some top tips to help you protect your IT infrastructure and reduce your risk of a ransomware attack.
The mass migration to remote working as a result of the coronavirus pandemic has seen many organisations adopt new platforms and applications to remain connected and productive. One popular application is Microsoft M365 thanks to its variety of features that make remote collaborative work simple and accessible.
Now that the UK has left the EU, you might be wondering what that means for EU roaming and whether you need to brace yourself for extra charges. Without the EU rules in place, the surcharge-free roaming when you travel to EU and EEA countries is no longer guaranteed, and the charges would depend on agreements between UK operators and their counterparts in EU countries.