
Half of SMEs experience surge in cyber-attacks
Over half of UK SMEs (54%) have experienced some form of cyber-attack in recent months a new report by Vodafone Business has found. Similar earlier research, conducted by Vodafone, found 39%
Over half of UK SMEs (54%) have experienced some form of cyber-attack in recent months a new report by Vodafone Business has found. Similar earlier research, conducted by Vodafone, found 39%
Phishing is basically ‘fishing’ for sensitive information. This could be anything from usernames, passwords, bank details, and other personal details. Cyber criminals use ‘bait’, such as a spoof email that
2023 has kicked off with a flurry of high-profile ransomware and cyber-attacks targeting sensitive and personal information, including Royal Mail and JD Sports. It shows that even large, well-known businesses are unnervingly vulnerable
Cyber security strategy and implementation can be daunting for charities that have either a small team or no in-house expertise. We get it. Smartdesc can provide a part-time virtual Chief
In March 2022, staff emails and phones suddenly stopped working at the large Scottish charity SAMH (Scottish Association for Mental Health). Gigabytes of sensitive charity data had been uploaded to
Sportswear chain JD Sports has said stored data relating to 10 million customers might be at risk after it was hit by a cyber-attack. The company said information that “may
The UK cybersecurity industry is short by c.14,100 workers according to the UK Government’s most recent cyber skills report. As the need for cybersecurity talent grows, demands for wages and other
Process injection is a technique used to inject malicious code into running processes. Because it evades detection techniques, innocent processes run the malicious injected code, unknowingly infecting the systems. A
Hacking can be a dirty word. It evokes images of a person sitting in the dark with a black hoodie on, hunched over a keyboard, in front of multiple screens,
Where you choose to base your SOC physically is a crucial yet underappreciated decision. The current financial environment has everyone money conscious, but many companies are still leaving themselves vulnerable