Mobile devices

How a label can save your organisation millions

As you read this article, as yourself a question; how do you really know that the device you’re reading this on is really yours? This may sound like a strange question but as users of technology, we trust that the devices we use (such as desktops, laptops, tablets and mobile phones) to work as intended and to have not been modified by anyone but the manufacturer. But this is not always the case. Victims of cyber-crimes often overlook the lengths…

Read More

How to avoid cyber-security incidents

IXCG deals with a large number of malware, virus and cybersecurity incidents every year and, in 90% of cases, a lack of basic planning means that a minor outbreak becomes a major, and very expensive, incident. With prevention costing roughly 5-10% of the cost of an incident, why are so many businesses getting it so wrong? The most common factors with incidents are that the affected organisations either believed that they wouldn’t be a target, or that someone else in…

Read More

The unsavoury side of USB storage

The unsavoury side of USB storage USB storage, (such as thumb drives, hard drives and mobile device integrated storage) is incredibly common in most workplaces. It’s cheap, convenient and provides a way of transferring or backing up large amounts of data easily. And, unfortunately, it is these attributes which make it a huge risk. A hacker’s friend Due to it’s ease of use and popularity, USB storage devices have become the favoured method of attack for many hackers and criminal…

Read More
Latest Tweets
Now more than ever, authentication is a smart and simplified approach to protecting your workforce. Join one of Wat… https://t.co/gfAOHhQi9p1 day
This week on The 443 ― Security Simplified, the team covers the latest in questionably-named nation-state hacks, a… https://t.co/cifbgrGHQV2 days
Cybercriminals are not taking it easy on healthcare workers during the COVID-19 pandemic. Rob Cataldo, MD of North… https://t.co/oKt4dpRiyT3 days
#DigitalAmnesia and #cyberstress there are consequences of our reliance on smartphones and the internet, according… https://t.co/9lA3FYvvbb3 days
How a comprehensive work-from-home policy can boost productivity and prevent security breaches. https://t.co/hHYvHWWT6K3 days