Protect
Protect is one of TechFinitive.com’s five key pillars. Here, we provide in-depth analysis of emerging threats to businesses along with a wealth of articles that will never go out of date – because the sad truth is that attackers will always be after our data.
We have a particular focus on ransomware, from simple guides to the key terms to the real-world after effects of a phishing attack. But we also want to provide practical advice on how to protect your business, whether that’s putting defensive measures in place or reminding people of the basics of cyber hygiene.
One of our key advantages is the depth and breadth of our writers’ experience. Davey Winder is one of the UK’s most respected cybersecurity journalists, having won numerous awards (it helps that he was once a hacker himself) and been covering cybersecurity ever since it became a “thing” in the 1990s.
We also draw on the knowledge that KG Orphinades earns in their day job, advising local small businesses on how to stay secure (KG also runs a website dedicated to VPNs). Last, and most definitely not least, Simon Edwards is CEO and founder of SE Labs, one of the world’s leading security testing labs, and a board member of the Anti-Malware Testing Standards Organization (AMTSO).
If you have a story that you would like to share – and we are happy to keep company names anonymous – then email us at [email protected], follow us on Twitter or join our community on LinkedIn.

Forgetful Browsing – Brave gives website owners a new headache
What is Forgetful Browsing and how will it affect users and website owners? Barry Collins, who remembers everything, reveals exactly what you need to know.

Top tech companies in Barcelona
Barcelona has an entire district dedicated to supporting tech development, so we had plenty of choice when picking out the top tech companies in the city.

What is an Advanced Persistent Threat (APT)?
As security expert Davey Winder explains, all sizes of business – and every individual who works for them – can be a target of an APT attack. Even if the end goal is a much bigger fish.

Uniting Diverse Brands Under A Single Identity Management Solution
Read this case study on why DCC chose Okta to maximise the potential of its merger and acquisition campaigns.

Okta for Mergers and Acquisitions White Paper
Read the Okta for M&A whitepaper now to explore the key challenges businesses face during mergers and acquisitions.

Increasing Agility for Mergers and Acquisitions
Read the Increasing Agility for Mergers and Acquisitions solution brief by Okta to explore the common barriers that slow down M&A success.

How ransomware attacks work
One of the UK's leading security experts reveals how attackers break in to business networks and extort ransoms from their victims. And you can't breathe easy afterwards, as they will likely attack again.

What is Zero Trust?
A "never trust, always verify" approach to information security has never been more important, with stolen credentials increasingly used to access networks and data. Is zero trust the answer?

How AI is helping IT managers do their jobs better right now
AI adds danger to IT managers' lives, but it can also help them through better insights, enhanced security and implementing Zero Trust policies. James Morris explains how.

Cisco signs agreement with telecom giant to expand cybersecurity services
Cisco and Norwegian telecoms giant Telenor have renewed their partnership with a focus on cybersecurity and multicloud-as-a-service

Sophos reveals how GPT can help defeat cyberattackers
Research reveals how cybersecurity defenders can use GPT-3 (and by extension GPT-4) to filter malicious activity and reduce cyber threats

How to secure your business online
There's a one in two chance that your business is an easy target for hackers. Simon Edwards, founder of one of the world's leading testing labs, explains the practical measures companies can take to tighten security.

Cybersecurity: The 2022 Board Perspective (Year in Review)
Proofpoint and Cybersecurity at MIT Sloane surveyed 600 board directors around the world. Download the report to read their findings.

Australian Banks increase scam protection as complaints rise
Westpac has announced a slew of measures to protect its customers against the growing menace of scams, including a four-hour payment delay

Confessions of an IT Manager: why I say “no” when you ask me for something new
If you've ever wondered why IT departments never approve the purchase you're asking for, our (mostly) friendly IT manager has the answer. But you may not like it.

Securing Microsoft 365
This e-book explores modern threats, best practices for protecting users and data, and what capabilities to look for when enhancing your Microsoft 365 defences

Redefining Data Loss Prevention (DLP)
Why insider threat management should be a critical part of your data loss prevention program.

2023 State of The Phish in Asia-Pacific
Download 2023 State of the Phish: Asia-Pacific and Japan to learn the biggest regional cyber threats and how to make your users your best defense.

Protecting the End User
This gated guide reveals how companies can best assess and mitigate user risk and how they can use that information to implement a successful and people-centric cybersecurity strategy.

The simple step you can take to protect your business against cyberattacks
The CEO of cyber-threat specialist SE Labs explains why spending money on cybersecurity solutions isn't enough on its own - you need to take control.