exclusive content

Are your legacy systems an open door for cyber attacks?

Often the business systems you rely on most can be the most neglected. They have been running well for years without much attention. However, this situation must now be challenged – the changing cyber threat landscape means the risk of downtime to your legacy systems is increasing. Here Nick Denning proposes six steps to protect […]

Very warns on delays as delivery partner hit by cyber-attack

Very has said its delivery partner Yodel has been subject to a cyber-attack that caused disruption and delays to operations. Yodel carries out fulfilment for the online retailer, which said only a small number of customers would be affected. In an email sent to customers on Monday, Very said: “We want to make you aware that […]

Cyberattack crashes Tennessee’s unemployment site

A cyberattack has crashed the state’s unemployment website and has left thousands unable to apply for benefits. A service interruption was reported on Sunday, sending Jobs4TN.gov offline and delaying benefit payments for thousands of Tennesseans. As of Thursday morning, applying for benefits on the site has been halted due to the crash, and the Tennessee […]

Government Agencies Deserve a Better Way to Pentest

A Synack Perspective for the Public Sector The public sector is feeling the squeeze between an increase in cyber attacks and a lack of increased resources to keep up. In a recent survey conducted on behalf of SolarWinds, public sector respondents reported increased concern over ransomware, malware and phishing the most over the previous year, […]

5 Steps to Battle Endpoint Cybercrime with KACE

Cyberattacks are increasing across all industries, and cybercriminals are savvier than ever. While the total number of IT vulnerabilities is decreasing, the number considered critical is on the rise — and so are the number of actual security exploits. Businesses are at risk of disruption, incurring devastating financial and reputational damage. In addition, endpoint updates […]

Defend against Cyberattacks with Social Engineering

Cyber-adversaries are using more and more sophisticated technology and social engineering techniques to scale up and launch targeted attacks on organizations. Across organizations, the human layer often acts as the entry point for advanced ransomware attacks. With the growing number of cyberattacks, organizations have no choice but to level up their security game. However, too […]