by Ian Tinney | Mar 29, 2022
Discover who our Technical Services Team are and what makes them different Cyber skills are in short supply worldwide and competition to attract and retain professionals is fierce. Microsoft estimates there were 2.5million cybersecurity vacancies globally as of March...
by Ian Tinney | Mar 21, 2022
Two-factor and multi-factor authentication mechanisms can be breached or bypassed. We look at why speedier detection might be more effective. Two-factor (2FA) and multi-factor authentication (MFA) provide an extra layer of defence to protect your passwords, but...
by Ian Tinney | Mar 10, 2022
Much has changed since the inaugural e-Crime Congress in London twenty years ago, not least how cybersecurity is perceived. It’s an important topic that is now not just on the boardroom agenda but has a seat at the table as part of the C-suite. The general consensus...
by Ian Tinney | Mar 2, 2022
Determining risk by quantifying “known knowns” and “known unknowns” has always presented security teams with something of a challenge, but we’re closer than ever to being able to accurately gauge the exposure of the business. This is because we no longer have to rely...
by Ian Tinney | Feb 28, 2022
We’ve seen explosive cloud growth in response to the demand for more flexible, agile, and accessible infrastructure over the last two years, but the rapid rollout created a significant security vacuum, enabling eCrime to flourish. There was a 630%[1] increase in...
by Ian Tinney | Feb 14, 2022
Password scraping has real potential as a breach detection/notification security tool, provided it is applied using robust controls. Password scraping is a technique that helps discover if your username and password have been compromised in a data breach, and...