Cyber 3-2-1: 3 stories about how your staff are targeted
Cyber 3-2-1: Happy Saint Patrick’s Day! Here are 3 stories to remind us how staff members are targeted by cyber attackers.
Cyber 3-2-1: Happy Saint Patrick’s Day! Here are 3 stories to remind us how staff members are targeted by cyber attackers.
Cyber 3-2-1: What are the cybersecurity lessons from Russia’s invasion of Ukraine, why did a small business pay a $150k ransom, and why you can’t you trust a phone call anymore?
Cyber 3-2-1: Another issue laiden down with news about recent cyber attacks, including against a UK financial advisory firm with some very interesting high-value clients. In response, the 5 steps you need to take right now to avoid the worst-case scenario of a ransomware attack. Plus an offer to ease my conscience.
I frequently encounter a broken relationship between my client and their IT MSP (managed service provider). In this first of two articles, I discuss why these relationships break down.
Cyber 3-2-1: Love is in the air, an Irish university responds to a ransomware attack, and CROs believe cyber risk is a higher priority than credit risk.
Cyber attackers are now advertising on Google. Don’t click on ads.
DORA is going be a nightmare. But an incident with one IT provider last week shows us why it’s necessary.
Cyber 3-2-1: PayPal and Norton breaches, predictions of imminent cyber catastrophy, and taser-equipped drones. What more could you ask for?
Cyber 3-2-1: Attacks don’t just happen to valuable targets. Telling staff “Don’t click bad links” isn’t working. And why we need to worry about LockBit.
If you suffered a ransomware attack, what's your plan to avoid paying the ransom? And is this a plan or a presumption?