The Cybercriminal Ecosystem: Evolution and Extortion
There is a good reason why manufacturing companies are seen as a prime target by cyber attackers: they are heavily reliant on information and operational technologies. Disruption and downtime can bring their business to a complete standstill and threaten its very existence. Which is why, once inside your business systems, the attackers’ blackmail demands can […]
Read moreAn introductory guide to email account security
David Fleming, Chief Technology Officer Your business email account is the most common entry point for criminals and is at the root of most successful cyber-attacks. It is not surprising that the most used function in a business is the one that criminals use to exploit. What is surprising, is that the security of a […]
Read more