Ransomware Domains Increase 35-Fold in Q1 2016

Explosion in ransomware drives all-time high in malicious domain creation Infoblox Inc. (NYSE:BLOX), the network control company, today released the Infoblox DNS Threat Index for the first quarter of 2016, highlighting a 35-fold increase in newly observed ransomware domains from the fourth quarter of 2015. This dramatic uptick helped propel the overall threat index, which […]

Taking It All In: What Typing Does to Listening and Leadership

Of all the information your colleagues shared with you yesterday, how much do you remember?  What happens to the rest? Our brains have boundaries There is a limit to what we can take in.  Our brains cannot store, let alone process all the facts that cross our path on an average working day.  If the […]

Lawyers Get Ready to Spend and Grow

New survey shows 74% of UK law firms planning to invest in new technology over next two years  A new survey of UK law firms by managed IT services provider Redcentric tells a story of a sector on the brink of operational change with a surprising 74% planning to invest in new technologies to help […]

IoT Security Must be Factored in to your Business Continuity Plans

The Internet of Things (IoT) industry must establish a common set of security standards of which to adhere, according to Oscar Arean, technical operations manager at disaster recovery provider Databarracks. Arean also argues that IoT risks should feature in organisations’ continuity plans if they want to be protected. Research carried out by Gartner has forecasted […]

Biometric authentication: The identity of a modern enterprise


Biometric technologies that use a person’s fingerprints, voice, heartbeat or even gait (the way we walk) as methods of authentication have attracted a lot of attention here in the UK for some time now. These techniques are gaining traction as the primary form of authentication to protect devices, apps and data. Biometric authentication is already […]

A Decade of Hacks and Data Breaches

Hostage by Hackers

Today’s threat landscape is in many ways very different from ten years ago. The growth of smartphones combined with pervasive internet, Bring Your Own Device (BYOD) and Application (BYOA) initiatives, introduced new threats to the workplace. Cloud servers made password security all the more important – with employees being able to store and access confidential […]

How to Prepare Your Business for a Data Breach

As anxiety-inducing as it may sound, you need to run your business under the assumption that a horrifying disaster could strike at any moment. In a perfect world, there would be no reason to fear a data breach, but we don’t live in a perfect world. Taking the right preventative measures can make all the […]