What is an insider attack and how to prevent them?

Although you can expect most cyber-attacks to come from outside of your business issues within your business can cause major breaches as well. Not all attacks are coming from hackers or cybercriminals attempting every day to access your sensitive data. An increasing...

How Attackers Enter Remote Desktops & How to Get Safe?

New research has identified a large rise in the number of attacks targeting the Microsoft Remote Desktop Protocol (RDP) during the Covid-19 pandemic. Businesses have gradually switched to Microsoft RDP as a way to help employees operate from home, with a device that...

How to Pick the Most Suitable Server for a Small Business?

hen a small business expands beyond two or three employees, it’s time to invest in a server machine for the office. The term “server” can refer to server hardware, software, or the functionality of either or both depending on the context. The logical...

What is Network Forensics?

Your server has just been wiped clean of all traces of an attack by a cybercriminal. Isn’t it true that you’ll never know where the attack came from or how much damage was done? Not, if you’re on the trail of a network forensic investigator. The...

Cyber-attack on the University of Northampton

The University of Northampton has experienced a cyber incident that was most likely triggered by a ransomware attack. However, university officials explained that the outage was triggered by a cyber-attack, although they did not identify the attack as a ransomware...