perm_phone_msgUNDER ATTACK? S.O.S. LINE 0114 354 0054

Top Categories

Spotlight

today25/11/2020

Cyber security TechRepublic

Top 5 business sectors targeted by ransomware

Any business is subject to ransomware attacks, but some are more hit more than others. Tom Merritt lists five business sectors that are targeted by ransomware. You may have heard me mention ransomware before. You know, the malware that locks up your systems and asks you to pay money in [...]

Top Voted
Sorry, there is nothing for the moment.

Month: February 2020

5 Results / Page 1 of 1

Background

today18/02/2020

  • 1
close

Cyber security ITPro.

What is cloud-to-cloud backup?

Most businesses understand the importance of having a robust backup strategy in place for their on-premises data, but as more companies migrate to the cloud, myths and misunderstandings are beginning to creep in about how to backup data in a cloud environment. One type of backup that is growing in ...

today17/02/2020

  • 1
close

Cyber security ITPro.

What is the Computer Misuse Act?

With the rise of personal computing devices in the 1980s and their increased prominence in businesses, lawmakers drafted fresh rules that aimed to protect the information increasingly on these machines. The Computer Misuse Act (CMA) 1990 is a key piece of legislation that criminalises the act of accessing or modifying data ...

today07/02/2020

  • 1
close

Cyber security ITPro.

What are biometrics?

An alarming amount of data breaches and security leaks are due to weak passwords. Some can be so poorly conceived they are begging to be hacked. We’re talking about ‘Password1’ and the many terrible variations that people use, or a fairly strong password that is then used for every single device ...

today06/02/2020

  • 2
close

Cyber security ITPro.

Panda Adaptive Defense 360 review: Security in black and white

Panda’s Adaptive Defense 360 (AD360) takes cloud-hosted security to the next level, combining a wealth of endpoint protection features with data control, encryption and patch management tools. This makes it appealing to businesses with GDPR compliance on their minds, as they can protect endpoints from malware, keep them updated with ...