Aabyss Blog Heading Background

News & Opinion

Gain the edge on the world of business technology and cyber security

Four ways disasters fuel cyberattacks - Disaster Preparedness

on 24-Sep-2023 09:00:00 By | Aaron Hayes. | 0 Comments | Attack Cybersecurity Disaster Recovery IT Support
Discover how disasters can pave the way for cyberattacks with these four insightful ways. As a business owner, you’re likely facing several challenges in today’s technology-driven world. However, unexpected disasters can further strain your organisation and create opportunities for cybercriminals to launch devastating attacks, exacerbating the chaos caused by such events. As a business leader, it’s crucial to prioritise disaster preparedness for both physical resilience and digital defence. Understanding how disasters can fuel cyberattacks and taking proactive steps to safeguard your business against these deceptive threats is essential. In this article, we’ll explore four significant ways disasters can amplify cyber threats and offer helpful strategies to bolster your cybersecurity posture in the face of adversity.
Read More

Common Mistakes with Cybersecurity Training and How to Avoid Them.

on 07-Aug-2023 03:00:00 By | Aaron Hayes. | 0 Comments | Attack Cybersecurity Security IT Support
In today’s digital age, cybersecurity training for employees has become a critical aspect of protecting a company’s sensitive information and assets. While organisations invest in various training programs, some still struggle to effectively educate their employees on cybersecurity best practices. This blog explores common mistakes made during employee cybersecurity training and provides valuable insights on how to avoid them.
Read More

Don't Trust These Zero Trust Security Myths

on 21-May-2023 09:00:00 By | Aaron Hayes. | 0 Comments | Attack Cybersecurity IT Support
Zero Trust security has recently become a hot topic in cybersecurity. It is a security model that assumes that any attempt to access information, systems, or devices is potentially malicious, regardless of whether it comes from inside or outside the corporate network. Unfortunately, while zero-trust security is highly effective, it is often misunderstood, leading to several myths in the IT world. Below, we explore four common Zero Trust myths and myth-busting facts.
Read More

It's Time to Bust these 3 Ransomware Myths

on 23-Apr-2023 12:00:00 By | Aaron Hayes. | 0 Comments | Attack Cyber Cybersecurity Security Ransomware
Welcome to the Aabyss blog Regarding ransomware, there's much misinformation out there. But unfortunately, most of it is based on misunderstandings or outdated information. In this blog, we will help you bust three common ransomware myths.
Read More

Recommended Best Practices to Reduce Cyber Supply Chain Risks.

on 24-Feb-2023 09:00:00 By | Aaron Hayes. | 0 Comments | Attack Cyber Cybersecurity Managed Service IT Support
How to Achieve Supply Chain Risk Management & Compliance. A supply chain attack is one of the most severe types of cyber threats that companies and organisations must address. It involves perpetrators gaining access to confidential information or data through the infiltrated systems within a company’s supply chain. Some of these attacks have caused significant damage, leading to lost revenue, disruption of services, and in some cases, reputational damage.
Read More

Don't ignore the basic IT warning signs

on 05-Jan-2022 13:36:42 By | Adam Lewis | 1 Comment | Attack Cybersecurity Tips & Tricks
Running an SME can often seem like a never ending stream of crucial choices. You are the core decision maker, responsible for many things; growth, client success and ensuring project deliverables are achieved. With so much at stake and so many plates to spin, some things can often be overlooked and IT can fall victim. When you are so occupied with other tasks, the small warning signs or tiny changes in normally mundane maintenance tasks that normally serve as a trigger to take action are often missed by your busy eyes. Pro-active management of key infrastructure is critical to enabling smooth growth and overall success within your business. Here we briefly discuss some basic IT red flags to keep a lookout for.
Read More

T-Mobile breach reported, over 40 million records exposed

on 20-Aug-2021 12:34:06 By | Adam Lewis | 0 Comments | Attack Security
Mobile telecoms giant T-Mobile are the latest high profile cyberattack victim with hackers stealing a huge cache of customer data reportedly including US social security number and driving licence information among other key personal details. This breach only affects their USA customers data and UK customers are not currently thought to be at risk.
Read More

Western Digital My Book NAS Owners Data Remotely Wiped

on 25-Jun-2021 13:30:00 By | Adam Lewis | 0 Comments | Attack Cloud Cybersecurity Backup
Western Digital NAS owners have been advised to disconnect their devices from the internet after reports of many of the devices being remotely wiped. Western Digital My Book is a network-attached-storage device users can manage remotely via the WD My Live Book app even if the device is behind a firewall.
Read More

'WannaCry' Cyber-Attack - All you need to know

on 15-May-2017 18:01:30 By | Jack Whisker | 0 Comments | Attack Cyber IT News Security
After Friday's major cyber-attack hit businesses and individuals worldwide, here is all you need to know.
Read More