Cybercriminals Migrate to Mobile Banking
We live in a connected world. Life without our mobile devices providing us with constant, easy access to a wealth of apps and services is scarcely imaginable.
37% of all companies were victims of ransomware attacks in 2021. Malware attacks, phishing attempts, DNS vulnerabilities and other methods of digital data theft can cause reputation damage as well as significant financial costs to businesses, especially given the higher risk of increased remote working. IT managers need to be on their guard and take these and other security threats seriously to ensure secure communication throughout their organization and deliver business continuity. Read about the latest news and developments in cybercrime.
Cybercriminals Migrate to Mobile Banking
We live in a connected world. Life without our mobile devices providing us with constant, easy access to a wealth of apps and services is scarcely imaginable.
Petty cash won't cover the cost of a data breach
Disclosing data unlawfully or becoming embroiled in a security incident has always been inconvenient and generally costly for business. Business critical information might fall into the wrong hands or cyber attacks could take essential services offline.
Risk to Business Travelers’ Data Grows
Business travel is a fertile hunting ground for hackers. Sensitive company data is seldom more at risk than when employees are on the road. The travel sector is notoriously susceptible to large scale data breaches. Moreover, new threat vectors are emerging to add to traditional ...
A risky business: what happens when transferring risk goes wrong?
The title of this article might seem a little confusing so let's start by breaking things down. Once a risk analysis has been conducted and the risks facing a company have been identified, for example the fundamental vulnerability of systems to malware, each risk must be ...
ECSM 2019 – Cyber security affects us all
Cyber security has many facets and affects all areas of our digital lives, both professional and private. In some environments, information security is mandatory where regulatory requirements foresee legal compliance or at least clear policies.
Intel processors: More holes than Swiss cheese?
Things had just begun to quieten down at Intel after Spectre and Meltdown, as the next dramatically named processor security vulnerabilities were announced. The ZombieLoad and Store-to-Leak Forwarding vulnerabilities already have their own website and logos,
Beitrag einsenden
Sed ut perspiciatis unde omnis iste natus error sit voluptatem accusantium doloremque laudantium, totam rem
Blog archive
Missed out on our latest post or want to read more articles on IT security? We’ve got it covered in the NCP blog archive.