So the big question is - is it actually safe for your employees to use security questions as a way to authenticate or recover account access? The short answer is...
Verizon’s 2015 Data Breach Investigations Report has found that over 90% of attack patterns involve a single, common denominator: people. Human error is a primary...
You could be forgiven for thinking that only large, rich brands like Sony, Adobe, and JP Morgan are the companies targeted by hackers as they’re pretty much the...
Would you take offense if someone called you gullible, naïve, easy to fool? Of course you would! But have you never been duped, not even by fake jeans, fake...
Whichever way you look at it, the notion of cloud computing appears to be the logical, if not miracle, solution for end users who want to access their files...
Please, sir, I want some more… No, that was a different Oliver, wasn’t it? Even so, like young Master Twist, hackers have come back for a second pass at the buffet...
Here’s a riddle for you: lie back, relax, close your eyes, and think about the last time you did a SWOT analysis. Let’s forget about the opportunities and threats...
High-profile data breaches in 2014 have exposed just how extensive - and expensive - cybercrime has become: it’s a billion-dollar industry with no shortage of...
Research conducted by the Irish Computer Society has revealed that Irish firms are increasingly becoming the victims of external hacking incidents: more than half...
Once upon a time, in a land far, far, away, an evil villain found a document containing three magic words that would grant him riches beyond his wildest dreams. He...