April 24 2023
Is Your Data Protection Strategy Fit for Purpose in Today’s Threat Landscape?
What should a data protection strategy include in 2023 and why is it a vital part of your business' defenses?
March 6 2023
What You Need to Know About Phishing
Research found that more than 255 million phishing attacks occurred in 2022, that’s a 61% increase compared to 2021.
January 17 2023
Intellectual Property Breaches: A New Target for Cybercriminals
Ransomware has forced business leaders to reevaluate the data they collect and process, it has also changed the dynamics of confidential data and intellectual property breaches in general. All data has value, but some types are simply worth more than others.
October 18 2022
MSP’s the new attack target
Cybercrime groups are beginning to specifically target managed service providers (Msp's) in order to gain access to their clients and users.
September 6 2022
Detecting Data Exfiltration – Why You Need the Right Tools
Why is having the right tools for data exfiltration prevention so important?
August 5 2022
5 Major Moments That Changed the History of Ransomware
What lessons should businesses be taking from these five major ransomware attacks and variants of recent years?
June 15 2022
Preventing Insider Threats: What Does it Take to Guard Against Data Exfiltration?
The cost of insider threats to businesses is on the rise, so how can you prevent data being compromised by these actions?
June 15 2022
Why Endpoint Protection is a Vital Part of Any Anti-Data Exfiltration Strategy
On-device protection for businesses' growing digital footprint is essential in protecting firms from data exfiltration - find out why this is a growing priority.
June 15 2022
Data Exfiltration – Do You Know Where Your Stolen Data is Going?
Understanding who's trying to steal your data and what they plan to do with it is essential in helping to protect your business from data exfiltration.
March 27 2022
Data Exfiltration 101: How Threat Actors Compromise Networks
Data exfiltration 101 describes the types of attacks that lead to data exfiltration and why 83% of all attacks rely on it as the primary vector.