Cyberattack on 15 UK Schools

Cyberattack on 15 UK Schools

Online learning at 15 Schools in the United Kingdom halted due to cyberattack. The Nova Education Trust co-operative own all the schools based in Nottinghamshire. The schools reported issues via social media, with the school needing to shut down the IT systems citing a cyberattack. Nova Education Trust stated that “a threat actor was able […]

The Solar Winds Hack Shows the Danger to All Countries

The Solar Winds Hack Shows the Danger to All Countries

The hacking that occurred in many of the U.S. agencies and departments has caused a massive tsunami around the globe.  The breach may have made the news in its announcement of the plight in the U.S., but it has also caused major problems with organizations, companies (including Microsoft), and even other governments of the world. […]

Creating a Good COVID-19 Security Plan

Creating a Good COVID-19 Security Plan

The COVID-19 pandemic has hit just about every country and cybercriminals have taken full advantage of its crippling effects. The sheer volume of increased cyberattacks has exposed the vulnerability of individuals, businesses, and governments. Scam e-mails from what appear to be valid sources such as the World Health Organization or government health websites have opened […]

https://www.computerweekly.com/opinion/Information-security-risk-keeping-it-simple?src=5798104&asrc=EM_ERU_101142024&utm_content=eru-rd2-rcpD&utm_medium=EM&utm_source=ERU&utm_campaign=20181001_ERU%20Transmission%20for%2010/01/2018%20(UserUniverse:%202637481) https://searchcompliance.techtarget.com/definition/risk-management

Understanding Cybersecurity Risk Management

For many organisations, the concept of risk management is a term that they only relate to investments or possibly the launch of a new product. Few have instituted the critical actions of risk management when it comes to cybersecurity. This attitude can be compared to the “it won’t happen to me”perspective, and when it comes to […]

Malvertising - davinciforensics

Malvertising: Accessing Your Data through Legitimate Advertising

Both consumers and businesses have long made the assumption that malware is delivered in a variety of ways, but most are through accessing low-level websites or opening email. As with any form of cyber hacking, the criminals have developed even more sophisticated methods and the most recent has been sending malware through legitimate advertising areas. […]