10.jpg

News & Opinion

Gain the edge on the world of business technology and cyber security

The Cloud is fantastic...

on 10-Mar-2020 11:28:00 By | Andrew Allen | 0 Comments | Technology Backup
Working in the Cloud is superb. There are literally thousands of different platforms and operators of Cloud-based services to choose from; providing you with a reliable, adaptable and responsive working environment enabling you to work from anywhere in the world.
Read More

Data Breaches are destroying our businesses

on 29-Jan-2020 14:30:24 By | Andrew Allen | 0 Comments | Cybersecurity Technology
Everyone should be aware of the fact that data breaches are serious. It’s not because these firms did not have an appropriate protection system in place that they went under, it’s because they were not prepared to deal with it to begin with.
Read More

Wordpress Sites Hacked to Propagate Scam Campaign

on 29-Jan-2020 14:28:15 By | Andrew Allen | 0 Comments | Cybersecurity Technology
The hacking campaign makes use of previously known vulnerabilities in WordPress plugins. Some of the vulnerable plugins exploited include the ‘CP Contact Form with PayPal’ and the ‘Simple Fields’. More than 2000 WordPress sites have been hacked by cybercriminals for a scam campaign that redirects visitors to several scam sites.
Read More

Ransomware Operators turn evil for late and non-paying victims

on 29-Jan-2020 14:27:09 By | Andrew Allen | 0 Comments | Cybersecurity Technology
A group of ransomware actors have threatened to publish data stolen from a German automotive supplier. Another group announced that they are going to release 9.5GB of data of a healthcare firm.   Source: https://cyware.com/news/ransomware-operators-turn-evil-for-late-reposnders-and-non-paying-victims-de65c7c1
Read More

Ransomware: Don't let your business be defrauded too

on 13-Jan-2020 16:31:58 By | Andrew Allen | 0 Comments | Cybersecurity Technology
The cyber threat is very real; a breach in cyber security resulting in the theft, loss or corruption of data, occurs every second in businesses and homes around the globe. 
Read More

Watch out for Online Identity Theft

on 13-Jan-2020 09:54:38 By | Andrew Allen | 1 Comment | Cybersecurity Technology
In this day and age, most of us spend our time online. Whether it’s on social media, online shopping or informative pages – you’ll find it hard to disagree with us that crucial information related to ourselves dwells in the online world.
Read More

Hackers strike again with a new Ransomware plot.

on 30-Dec-2019 10:06:28 By | Andrew Allen | 0 Comments | Cybersecurity Technology
Ransomware gangs have signalled to publish the data stolen from victims who refuse to pay the ransom. Cybercriminals behind the Maze ransomware have erected a website on the public internet that identifies recent victim companies that opted not to pay a ransom. Ransomware gangs have now upped the ante of their attacks to cause massive losses for victim organisations. They have signalled to publish the data stolen from victims who refuse to pay the ransom.
Read More

Cybersecurity in 2019: Expectation Vs Reality

on 30-Dec-2019 10:05:37 By | Andrew Allen | 0 Comments | Cybersecurity Technology
In 2019, 32 percent of breaches and 78 percent of cyber-espionage incidents were carried out through phishing attacks. Automation gained grounds in security operations across many organisations this year. To make growth in the right direction, it’s important to learn from history and carve the future strategies accordingly. The year 2019 saw cybersecurity technology advancing and evolving new tools and techniques to meet the challenges posed by the latest cyber threats. In fact, many also predicted last year about how the attack tactics of adversaries would grow, what technologies would play a critical role in shaping the future of cybersecurity, and more.
Read More

The Most Common Passwords Found From Breaches in 2019

on 30-Dec-2019 10:05:02 By | Andrew Allen | 0 Comments | Cybersecurity Technology
Researchers analysed data leaked in various data breaches to bring this study forward. Passwords ‘12345,’ ‘123456,’ and ‘123456789’ were the most common passwords, followed by ‘test1’ and, of course the password ‘password’. A bunch of independent anonymous researchers composed a list of 200 most popular passwords that were leaked in data breaches during 2019 and shared it with security firm NordPass.
Read More

Liverpool can help lead the Fourth Industrial Revolution

on 13-Nov-2018 11:35:18 By | Keith Smith | 0 Comments | Connectivity IT News Technology
For Liverpool the future is exciting! Last week the Aabyss team attended the 2018 Liverpool City Region Digital Summit hosted by LCR Activate, and what an event it was.
Read More