Personal and identifiable data needs to be encrypted or password protected and only accessed by those who need it, on this the Data protection act is very clear.
(read more) "An Eye on the Data"
To say that a cyber-attack can cost hundreds of millions is no exaggeration. The examples below are of high-profile corporations with sizeable annual revenues, but the cost implications are all relative. The more you have, the more you have to lose.
(read more) "Picking Up the Pieces After of a Cyber-Attack"
Social engineering – just one of the methods favoured by scammers to exploit the trust of a business and its employees. Just like fraud in the real world, social engineering tricks people into giving information or access to those who shouldn’t have it, by pretending to be someone they’re not, such as a representative from the company’s bank.
(read more) "5 Ways to Protect Your Business Against Social Engineering"