Cryptomalware: What is it and is it on your computer?

Cryptomalware: What is it and is it on your computer?

Cryptomalware – also known as cryptojacking – is when attackers install undetectable malware on a victim’s computer in order to use their computing resources to mine cryptocurrency. With the popularity of all kinds of cryptocurrency surging, this type of...
How to combat insider threats

How to combat insider threats

Insider threats – when an employee illegally discloses confidential information – are often a result of sophisticated social engineering. And, as we enter into difficult economic times, the potential for this to happen increases.  But why are some...
Why cybersecurity is so important during a recession

Why cybersecurity is so important during a recession

With fears of a recession looming, many companies are looking for ways to reduce spending. Cybersecurity is an area where it can be tempting to cut costs as it doesn’t directly contribute to the bottom line. However, there are several reasons why cybersecurity should...
5 ways AI can help with cybersecurity

5 ways AI can help with cybersecurity

Although artificial intelligence (AI) is not new, it’s become the focus of many mainstream conversations thanks to the launch of high-profile generative AI like ChatGPT and Dall-E. So how can cybersecurity professionals benefit from using AI in their work? Curating...
4 tips from cybersecurity experts

4 tips from cybersecurity experts

Cybersecurity threats are constantly evolving and trends change rapidly, so it can be hard to know how to stay on top of it all. Following leading cybersecurity experts and keeping up to date with information they share is a good way to do this, so in this blog post...
Data breach vs data leak: what’s the difference?

Data breach vs data leak: what’s the difference?

Although the terms data breach and data leak are sometimes used interchangeably, they are actually quite different and can therefore require slightly different approaches when it comes to cyber security. So what are the differences? What is a data breach? A data...