exclusive content

The new ABCs of application security

Applications are the building blocks of how digital businesses work and how they engage with their end users and customers. The move to remote work in 2020 intensified the importance of web apps, and many organizations have had to pivot rapidly to upgrade their existing web services, expose older applications over the internet, or deploy […]

Don’t pay the ransom

In simple terms, ransomware is malicious software that either encrypts your data or otherwise stops you from accessing your own systems. The criminals then demand a ransom in exchange for the decryption key, although, of course, there is no guarantee that the key will work and you will get your data back. Many victims have […]

Spear Phishing: Top Threats and Trends

Key findings on the latest social engineering tactics and the growing complexity of attacks Cybercriminals are constantly refining their tactics and making their attacks more complicated and difficult to detect. In this in-depth report, Barracuda researchers share their insights on the most recent trends in social engineering and the new methods attackers are using to […]

The risk of ransomware to Microsoft 365 data

Ransomware attacks hRansomware attacks have consistently hit the headlines in recent years, causing serious reputational and financial losses for organisations in every industry. Ransomware attackers ruthlessly seize data from compromised companies, encrypt the data taking systems offline, extort pay outs to restore access and blackmail companies to prevent stolen data from being publicly exposed.ave consistently […]

Zero Trust Network Access: Barracuda’s ultimate guide.

The cybercrime threat landscape is more saturated than ever, with attacks growing in sophistication and successfully hitting organisations in every sector. What’s also growing is the financial damage to these businesses: IBM Security reported a 10% increase in the average total cost of a breach from 2020-2021 — the largest increase in a single year […]

3 steps to easily manage and secure privileged access.

Effective management of privileges and credentials is essential for the security of your organisation. With 74% of data breaches happening due to privileged credential abuse, it’s an area that organisations must address. Cyber attackers can abuse credentials through several methods. The main approaches are social engineering and phishing, exploiting poor password hygiene and password reuse, […]

The new ABCs of application security

Applications are the building blocks of how digital businesses work and how they engage with their end users and customers. The move to remote work in 2020 intensified the importance of web apps, and many organizations have had to pivot rapidly to upgrade their existing web services, expose older applications over the internet, or deploy […]

13 email threat types to know about right now

A cyberattack can affect your business in many ways, depending on its nature, scope, and severity. According to the FBI’s Internet Crime Complaint Center (IC3), cybercrime cost $3.5 billion in losses in 2019 alone, with business email compromise (BEC) causing the most damages. That doesn’t include unreported losses, which are significant. IC3 received 467,361 complaints […]

The role of AI in email security

Email remains the most common initial attack vector for cybercriminals. Infiltrating an organisation via an email-based attack can happen at any level — phishing is not only targeted at the C-suite. Once attackers have got an individual’s credentials then they can gain access. Once inside the network with one set of credentials, attackers can more […]

Marketplaces: A new way to transact solutions.

A marketplace is essentially a cloud-based online storefront. Each of the big cloud services has one. Some speciality cloud providers run their own marketplaces as well. These marketplaces let customers find and access software and services from multiple different providers that will run on that cloud platform. Those apps and services can be purchased directly […]