stolen digital identities

When you are on the Internet, you should know who you are interacting with at all times. That's why digital identities exist, and are utilized by computer systems to represent external agents. These agents may be a device, application, organization,...

Read More
IoT hacks and ransomware

It was predicted that by the end of 2017, the number of cyber attacks could reach over 180 million. The economic damage caused by cyber criminals is often massive. Yet it is a saddening fact that up to 70% of...

Read More
digital transformation

For businesses everywhere, digital transformation is the buzz phrase at the moment. Before we proceed, let's first define transformation. The term describes a whole scale change to the foundational components of a business, from the operating model of the business...

Read More
maleware security for the cloud

As more and more businesses employ the cloud system, it has opened the floodgates for many new threats - with malware and ransomware prevalent among these threats. As there is a reliance on the cloud to connect your team, there...

Read More
Petya Ransomware

As Ukraine reels from the attack from Petya ransomware, cyber security experts are warning that it is not just large corporations that are being exposed to the malware but consumers too. If you are running an operating system that can...

Read More