FreshRSS

🔒
☐ ☆ ✇ WeLiveSecurity

Cyberattacks: A very real existential threat to organizations

By Phil Muncaster — July 4th 2022 at 09:30

One in five organizations have teetered on the brink of insolvency after a cyberattack. Can your company keep hackers at bay?

The post Cyberattacks: A very real existential threat to organizations appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Do back offices mean backdoors?

By James Shepperd — June 29th 2022 at 09:30

War in Europe, a reminder for shared service centers and shoring operations to re-examine IT security posture

The post Do back offices mean backdoors? appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

5 ways cybercriminals steal credit card details

By Phil Muncaster — June 27th 2022 at 09:30

Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can keep yours safe

The post 5 ways cybercriminals steal credit card details appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Virtual private networks: 5 common questions about VPNs answered

By André Lameiras — June 23rd 2022 at 09:30

(Almost) everything you always wanted to know about virtual private networks, but were afraid to ask

The post Virtual private networks: 5 common questions about VPNs answered appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Phishing awareness training: Help your employees avoid the hook

By Phil Muncaster — June 21st 2022 at 09:30

Educating employees about how to spot phishing attacks can strike a much-needed blow for network defenders

The post Phishing awareness training: Help your employees avoid the hook appeared first on WeLiveSecurity

☐ ☆ ✇ WeLiveSecurity

Crypto mixers: What are they and how are they used?

By Sol González — June 20th 2022 at 09:30

How crypto mixers, also known as crypto tumblers, are used to obscure the trail of digital money

The post Crypto mixers: What are they and how are they used? appeared first on WeLiveSecurity

❌