Zero days

Zero day attacks

Cyber security is only as strong as your weakest link. Even with the latest and greatest AV in place, what happens when a brand new threat is discovered? It's unknown to the vendors and therefore slips through the net, creating a vulnerability until a patch is applied.

Insider threats

Research shows businesses see employees and other insiders as the most likely culprits of data theft (ahead of competitors or third parties), so we reveal how it's possible to immediately improve security by completely removing excess privileges without hindering productivity.

Insider threats
Social engineering

Social engineering

Social engineering attacks are becoming more common and sophisticated. Figures show the number of phishing sites and associated email traffic increased 250% in the first quarter of 2016, in comparison with the final quarter of the previous year.

We examine some of the most commonly used techniques, including phishing, to give you a better understanding of the current threat and look to the future with expert predictions.

Ransomware

Instances of ransomware are becoming more common, and increasingly costly for the victims. Such has been its impact in recent years that ransomware is now the most profitable malware type in history, generating $209 million for criminals in the first three months of 2016 alone.

Ransomware often requires very little effort on the part of the criminal, and detection-based software is not keeping pace with the growth. We’ve put the focus on the threat, to make sure you’re fully informed about the risks and know how to protect yourself.

Ransomware