Security

For businesses, one weak password can be the cause of a major cybersecurity incident. For this reason, businesses should take measures to ensure they are doing everything possible to reduce the chance of falling victim to an account compromise attack. Whilst having a strong password...

Phishing attacks are a form of social engineering where a cybercriminal imitates a trusted entity and tricks an individual into opening a fraudulent email, SMS, or instant message. This message is designed to deceive the victim into sharing sensitive information or clicking a link that...

On January 13th, the Microsoft Threat Intelligence Centre (MSTIC) identified multiple cases of malware targeting organisations within the Ukraine. The Ukraine government has indicated that they have ‘evidence’ that the cyberattack was carried out by Russian nation-state actors. Russia has since stated that it has...

Just as the way businesses use technology has changed over the past 5 years, so too has the cybersecurity threat landscape. Previously, businesses were concerned with securing a small number of systems, such as networks, phone systems and endpoint devices, such as PCs and printers....

The rise of hybrid working has forever changed how businesses must view their security posture. As employees are now working between multiple locations, the risk of data breaches, cyberattacks and network intrusion has grown exponentially. With employees working from home, it is more difficult for...

All industries have undergone a period of digital transformation over the past two decades. The advancement of technology has had a myriad of benefits for businesses, including increased profitability, productivity and some technologies have completely changed the way businesses function. The construction industry now relies...