Cybercriminals are actively exploiting a two-year-old VMware vulnerability as part of a ransomware campaign targeting thousands of organizations worldwide. Admins, hosting providers, and the French Computer Emergency Response Team (CERT-FR) warn that attackers actively target VMware ESXi servers unpatched against a two-year-old remote code execution vulnerability to deploy a new ESXiArgs ransomware. The security vulnerability […]
The rate at which companies are experiencing cyber security breaches is alarming and the damage can be detrimental if you don’t have an incident response plan in place. Cyber attacks are an ever-growing threat for businesses of all sizes and criminals methods are only becoming more sophisticated. The recent high-profile attacks target healthcare, finance, retail, […]
Discover how organizations can build a culture of cyber resilience by reducing risk, limiting damage, having a disaster recovery plan and assuming a cyber attack is coming. As a growing business, your ever-expanding digital footprint gives cyber criminals even more opportunity to extort money, disrupt your productivity, and generally wreak havoc for you and your […]
Artificial intelligence startup OpenAI launched ChatGPT, a chatbot that optimizes language models for dialogue to interact conversationally. Bots are nothing new, but ChatGPT is unusually slick with language thanks to a training process that included digesting billions of words scraped from the web and other sources. The dialogue format makes it possible for ChatGPT to […]
Maintaining an updated cyber security incident response plan within your company is the first step toward dealing with a cyber attack. Cyber attacks are an ever-growing threat for businesses of all sizes. If you wait for a breach to occur before thinking about your response, it’s already too late. While attempted attacks are almost inevitable, […]
Keeping up with the latest developments in email security is critical for your business cyber defences. In H1 2022, Vade detected more than 440 million phishing and malware-laced emails, a figure illustrating that cybercriminals remain as active and motivated as ever. Fortunately, organizations can take steps to stay ahead of the curve, such as becoming more cyber-aware, securing […]
Computer viruses are an increasingly common cyber attack against businesses, and an infection can cause catastrophic levels of harm. Some possible outcomes of virus infection are data theft, file corruption, customer spam, or system crashes, all of which can put business continuity at risk. While some computer viruses are easy to spot and avoid, others […]
IT support is essentially about offering assistance to company employees and the wider organization regarding technology related issues. The purpose is to provide users with answers to problems they may be experiencing. Look at it this way, it’s Monday morning, and you’re trying to connect to the office from home. You’ve tried multiple times, but […]
Most business leaders are familiar with the hardware and software elements of their business IT infrastructure. However, many overlook the importance of “wetware” when it comes to their cyber security. Wetware is an informal term used to describe the people who interact with IT, it’s coder slang for the human element of IT architecture, and […]