Aabyss Blog Heading Background

News & Opinion

Gain the edge on the world of business technology and cyber security

Cybersecurity in 2019: Expectation Vs Reality

on 30-Dec-2019 10:05:37 By | Andrew Allen | 0 Comments | Cybersecurity Technology
In 2019, 32 percent of breaches and 78 percent of cyber-espionage incidents were carried out through phishing attacks. Automation gained grounds in security operations across many organisations this year. To make growth in the right direction, it’s important to learn from history and carve the future strategies accordingly. The year 2019 saw cybersecurity technology advancing and evolving new tools and techniques to meet the challenges posed by the latest cyber threats. In fact, many also predicted last year about how the attack tactics of adversaries would grow, what technologies would play a critical role in shaping the future of cybersecurity, and more.
Read More

The Most Common Passwords Found From Breaches in 2019

on 30-Dec-2019 10:05:02 By | Andrew Allen | 0 Comments | Cybersecurity Technology
Researchers analysed data leaked in various data breaches to bring this study forward. Passwords ‘12345,’ ‘123456,’ and ‘123456789’ were the most common passwords, followed by ‘test1’ and, of course the password ‘password’. A bunch of independent anonymous researchers composed a list of 200 most popular passwords that were leaked in data breaches during 2019 and shared it with security firm NordPass.
Read More

The Tale of Ali Baba Is Why We All Need Multi-Factor Authentication!

on 13-Jun-2019 11:56:14 By | Keith Smith | 1 Comment | Cybersecurity
One day, Ali Baba, a poor woodcutter is out hard at work chopping wood in the forest, when he is suddenly distracted. Paying closer attention, he overhears a band of thieves gaining access to a magical cave containing vast treasures. Equipped with the secret password he waits until they depart and makes for the entrance of the magic cave. Once upon it, he merely repeats the words “Open Sesame” and with that enters and makes off with the treasure.
Read More

5 Traits to Look for in an Effective CIO

on 05-Jun-2019 09:57:04 By | Andrew Allen | 0 Comments | Management Strategy
There are times when you do not have the technology expertise required within your company to plan a project or to solve a problem that feels like it is crippling one or more business operations. There is no need to feel discouraged.
Read More

Aabyss - Dark Web Experience

on 03-Jun-2019 12:43:50 By | Greg Jones | 0 Comments | IT News
Have you ever wondered about the Dark Web or would you like to see a LIVE disaster demo? Why not spend a morning exploring the Dark Web in a safe and secure environment with Aabyss!
Read More

Aabyss Ltd & Tandem Systems Ltd Announce Merger

on 01-Mar-2019 13:28:07 By | Greg Jones | 1 Comment | Aabyss News
Aabyss Limited announces the merger of Aabyss’ and Tandem Systems Limited’s business operations. As Aabyss welcomes Tandem’s clients into the larger company, it also embraces the employees who are joining the Aabyss family.
Read More

Growth Starts with Goals!

on 14-Jan-2019 11:41:55 By | Greg Jones | 0 Comments | Strategy
The new year has been ushered in and we have found ourselves with another 365 opportunities in which to fulfil our aspirations. Figuratively speaking, most people take the new year as an opportunity to experience a rebirth of sorts. New diet, new hobbies, new values, new standards, new objectives. All admirable and essential if we are to evolve and grow, but they all represent aspirations and not, reality!
Read More

Merry Christmas From Aabyss!

on 10-Dec-2018 17:05:43 By | Greg Jones | 0 Comments | Aabyss News
Now the Aabyss Christmas tree is up and just before the social media platforms get bombarded with Christmas post’s we would like to get this out!
Read More

Festive Fraud!

on 07-Dec-2018 13:50:43 By | Greg Jones | 0 Comments | Cybersecurity Tips & Tricks
As the hustle and bustle of Christmas kicks in, make sure you don’t fall prey to festive fraud! A recent report by Action Fraud found that last year 15,024 people were conned out of £11 million by fraudsters over the Christmas period!
Read More

Email Security Best Practice Guide

on 04-Dec-2018 13:06:59 By | Keith Smith | 0 Comments | Cybersecurity Security Tips & Tricks
Despite the ever-increasing amount of communication applications, email remains and is likely to remain the primary method of communicating important information between employees and customers. We use it to verify our identity, send our thanks or apologies, invoices, offers, and information amongst many other vital things. It is something we demand and depend upon if we are to interact smoothly with our partners and clients. Yet many of us don’t require or at least practice security standards that befit such an essential and often sensitive act. Startling is that the writing is on the wall when it comes to email security!
Read More